• Tor transparent proxy on Linux: a simple implementation

    The starting idea comes from a colleague that asked me: "Is it possibile routing all system traffic thougth TOR, using it as a sort of VPN?". Yes, It's possible, using a specific feature of Tor. Tor has support for transparent… read more »
  • My Weekly RoundUp #97

    This week I want to launch a new section in my Weekly Roundup: "INBOX" will contain my answers to questions and suggestions from readers, which I receive frequently, also via email and social media. INBOX A new incident response tool… read more »
  • "10 Must-Know Classical Pieces for Fingerstyle Ukulele": my new songbook is available on Amazon!

    Ten ukulele arrangements of famous classical pieces, with fingering and tabs. In the musical field, I was born as a classical guitarist and, after my academic studies, I dedicated myself to other instruments, including my beloved ukulele. So, classical music… read more »
  • Windows Security Event Logs: my own cheatsheet

    During a forensic investigation, Windows Event Logs are the primary source of evidence.Windows Event Log analysis can help an investigator draw a timeline based on the logging information and the discovered artifacts, but a deep knowledge of events IDs is… read more »
  • My Weekly RoundUp #96

    Another week, another BGP hijack… Privacy Disclosing Tor users' real IP address through 301 HTTP Redirect Cache Poisoning https://vimeo.com/339586722 This blog post describes a practical application of the ‘HTTP 301 Cache Poisoning” attack that can be used by a malicious… read more »
  • Prelude from Bach's Cello Suite No. 1, BWV 1007: my own ukulele arrangement

    A great classic, often used in gigs and weddings. Johann Sebastian Bach wrote his Cello Suite no. 1 around 1720, though the work was not published until 1825.It is a work in seven movements, and the Prelude, mainly consisting of… read more »
  • SensorID: fingerprinting smartphones using data gathered from the accelerometer, gyroscope and magnetometer sensors

    A new fingerprinting technique, developed by a team of University of Cambridge, allows websites to uniquely identify a phone, based on data from the accelerometer, gyroscope, and magnetometer sensors. Usually web browser provides a range of information to the website,… read more »
  • My Weekly RoundUp #95

    What happened last week? Some vulnerabilities, a couple of science news, Good Omens for Amazon, and Bad Omens for ProtonMail Cybersecurity Reverse Engineering of a Not-so-Secure IoT Device The ‘Internet of Things’ is coming! It started as an overused marketing… read more »
  • Ferdinando Carulli, Andante n. 18 from "Guitar Method" Op. 241: a Ukulele arrangement

    A delightful guitar study by Ferdinando Carulli. This Andante in A minor by Ferdinando Carulli is part of the composer's "Méthode complète pour parvenir à pincer la guitare", Op. 241, first published in Paris around 1825. The piece has an… read more »
  • Some thoughts about Kerberos Golden Tickets

    Recently i've worked on a cybersecurity incident that involved the use of Silver Tickets on Kerberos. I think may be useful a brief recap about this attack technique. What is Kerberos? Kerberos authentication is currently the default authorization technology used… read more »
  • My Weekly RoundUp #94

    Trump's ban for Huawei, and towel day! Cybersecurity PoC Exploit For Unpatched Windows 10 Zero-Day Flaw Published Online An anonymous hacker with an online alias "SandboxEscaper" today released proof-of-concept (PoC) exploit code for a new zero-day vulnerability affecting Windows 10… read more »
  • Don't Panic!

    Happy Towel Day 2019! Towel Day is a tribute to Douglas Adams and takes place on May 25th, two weeks after Adams' death on May 11, 2001. During the Towel Day fans of Adams carry around a towel all day,… read more »
  • How a keylogger works: a simple Powershell example

    Some months ago i've written a post about keyloggers (because "during a malware analysis process is useful to know how a keylogger works"), where I've shared a simple Windows keylogger written in Python. Today I want to share another example,… read more »
  • My Weekly RoundUp #93

    Last week? A lot of new vulnerabilities in the wild! Privacy Google is using your Gmail account to track your purchases Do you think your email on Gmail is private? If so, you may want to think again, as your Gmail… read more »
  • Must-Known Ukulele Songs: Magic Ukulele Waltz, by Roy Smeck

    This time the song is not simple: I hope that my transcription will be useful! Born in 1900, Pennsylvania, Roy Smeck was a virtuoso ukulele performer. Smeck had an incredible technique, and a great entertain attitude. He applies a lot… read more »
  • How to read Windows Hibernation file (hiberfil.sys) to extract forensic data?

    The hibernation file (hiberfil.sys) is the file used by default by Microsoft Windows to save the machine's state as part of the hibernation process. The operating system also keeps an open file handle to this file, so no user, including… read more »
  • My Weekly RoundUp #92

    The news I read last week didn't really impress me. Just something about Microsoft and OpenSource and, of course, Game Of Thrones! Privacy Security lapse exposed a Chinese smart city surveillance system: thousands of facial recognition scans were matched against… read more »
  • The history of the world according to cats

    Okay, it's Friday. Today we're talking about a light and funny topic: yes, we talk about cats! The domestication of the modern house cat can be traced back to at the Neolithic era. Neolithic farmers stored grain in large pits… read more »
  • iptables: a simple cheatsheet

    Whether you’re a novice user or a system administrator, iptables is a mandatory knowledge! iptables is the userspace command line program used to configure the Linux 2.4.x and later packet filtering ruleset.When a connection tries to establish itself on your… read more »
  • My Weekly RoundUp #91

    Strange weekend for Firefox users... Technology Firefox Addons Being Disabled Due to an Expired Certificate Mozilla Firefox users are discovering that all of their addons were suddenly disabled. It turns out that this is being caused by an expired intermediary… read more »