• Some thoughts about Kerberos Golden Tickets

    Recently i've worked on a cybersecurity incident that involved the use of Silver Tickets on Kerberos. I think may be useful a brief recap about this attack technique. What is Kerberos? Kerberos authentication is currently the default authorization technology used… read more »
  • My Weekly RoundUp #94

    Trump's ban for Huawei, and towel day! Cybersecurity PoC Exploit For Unpatched Windows 10 Zero-Day Flaw Published Online An anonymous hacker with an online alias "SandboxEscaper" today released proof-of-concept (PoC) exploit code for a new zero-day vulnerability affecting Windows 10… read more »
  • Don't Panic!

    Happy Towel Day 2019! Towel Day is a tribute to Douglas Adams and takes place on May 25th, two weeks after Adams' death on May 11, 2001. During the Towel Day fans of Adams carry around a towel all day,… read more »
  • How a keylogger works: a simple Powershell example

    Some months ago i've written a post about keyloggers (because "during a malware analysis process is useful to know how a keylogger works"), where I've shared a simple Windows keylogger written in Python. Today I want to share another example,… read more »
  • My Weekly RoundUp #93

    Last week? A lot of new vulnerabilities in the wild! Privacy Google is using your Gmail account to track your purchases Do you think your email on Gmail is private? If so, you may want to think again, as your Gmail… read more »
  • Must-Known Ukulele Songs: Magic Ukulele Waltz, by Roy Smeck

    This time the song is not simple: I hope that my transcription will be useful! Born in 1900, Pennsylvania, Roy Smeck was a virtuoso ukulele performer. Smeck had an incredible technique, and a great entertain attitude. He applies a lot… read more »
  • How to read Windows Hibernation file (hiberfil.sys) to extract forensic data?

    The hibernation file (hiberfil.sys) is the file used by default by Microsoft Windows to save the machine's state as part of the hibernation process. The operating system also keeps an open file handle to this file, so no user, including… read more »
  • My Weekly RoundUp #92

    The news I read last week didn't really impress me. Just something about Microsoft and OpenSource and, of course, Game Of Thrones! Privacy Security lapse exposed a Chinese smart city surveillance system: thousands of facial recognition scans were matched against… read more »
  • The history of the world according to cats

    Okay, it's Friday. Today we're talking about a light and funny topic: yes, we talk about cats! The domestication of the modern house cat can be traced back to at the Neolithic era. Neolithic farmers stored grain in large pits… read more »
  • iptables: a simple cheatsheet

    Whether you’re a novice user or a system administrator, iptables is a mandatory knowledge! iptables is the userspace command line program used to configure the Linux 2.4.x and later packet filtering ruleset.When a connection tries to establish itself on your… read more »
  • My Weekly RoundUp #91

    Strange weekend for Firefox users... Technology Firefox Addons Being Disabled Due to an Expired Certificate Mozilla Firefox users are discovering that all of their addons were suddenly disabled. It turns out that this is being caused by an expired intermediary… read more »
  • Matteo Carcassi, "Andantino in C": a simple Ukulele arrangement

    Matteo Carcassi was a famous Italian guitarist and composer.Born in Florence, Carcassi also studied the piano, but learned guitar when still a child: he quickly gained a reputation as a virtuoso concert guitarist. This simple study is taken from the… read more »
  • RaiPlayDL: a python script to automatically download and merge RaiPlay Radio Podcasts

    RaiPlay is the online platform of italian national broadcast company RAI: on this platform a big amount of interesting contents are freely available. A special section is dedicated to radio channels, with a lot of good (italian) audio tracks: documentary,… read more »
  • My Weekly RoundUp #90

    DockerHUB had some trouble… Privacy Alexa, stop being creepy! Our letter to Jeff Bezos Dear Mr. Bezos, We are writing to call for your urgent action regarding last week’s report[1] in Bloomberg, which revealed that Amazon has been employing thousands… read more »
  • Glenn Greenwald: Why privacy matters

    This TED Talk by Glenn Greenwald is really inspiring. Glenn Greenwald was one of the first reporters to see the Edward Snowden files, with their revelations about the United States' extensive surveillance of private citizens. In May 2013, Glenn Greenwald… read more »
  • How to mount a Azure's VHD disk image on Linux

    I just recently to perform a forensic analysis on a compromised Microsoft Azure VM, and I'd like to share a couple of useful tips. The first step is the download of disk image of the VM.Pretty simple: Azure dashboard allows… read more »
  • My Weekly RoundUp #89

    Bendgate 2.0, Sea Turtle Hijacking and some problems for 'Wannacry Hero' Privacy The mystery of the Amazon Echo data With over 6.3 million Amazon Echo devices worldwide, there is a good chance these constantly active devices will record criminal behavior.Bloomberg, who recently… read more »
  • "New Britain" (Amazing Grace): a fingerstyle ukulele rendition

    "New Britain" was originally a pentatonic folk tune, with melodic figures that outline triads: probably it was sung slowly with grace notes and melodic embellishments. In 1835 William Walker assigned to this song the words of the hymn "Amazing Grace"… read more »
  • How to extract forensic artifacts from pagefile.sys?

    Microsoft Windows uses a paging file, called pagefile.sys, to store page-size blocks of memory that do not current fit into physical memory. This file, stored in %SystemDrive%\pagefile.sys is a hidden system file and it can never be read or accessed… read more »
  • My Weekly RoundUp #88 - Dragonblood, M87 Black Hole, SpaceX and Game of Thrones' Season 8

    No, nothing about Julian Assange's arrest: i've already published a long post last friday. Cybersecurity Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords The next-generation Wi-Fi Protected Access protocol released 15 months ago was once hailed by… read more »