-
Mar 27, 2021
An interesting article and video lesson by security reserarcher Didier Stevens. Cobalt Strike and Metasploit are the offensive security tools most commonly used to host malware command-and-control (C2) servers: both tool allows generation of shellcode for http(s) shells so, during… read more »
-
Mar 21, 2021
Strange sounds, delays, reverbs, noises: 13 instrumental, synthetic, ethereal songs.
Available today on all major music streaming services, such as Apple Music and Spotify:
https://open.spotify.com/album/45ynm44gnBRb6wMdNS9w8V
I hope you enjoy it!
… read more »
-
Mar 13, 2021
Some months ago, my loved Thinkpad x1 carbon started to have some issues on battery and motherboard. It was an 8 years laptop, so i decided to directly buy a new device for my "personal purposes" (all devices for work… read more »
-
Mar 6, 2021
Just some simple tips that I found very useful. Bash supports read/write operations on a pseudo-device file /dev/tcp/[host]/[port] [1]. Writing to this special file makes bash open a tcp connection to host:port, and this feature may be used for some useful… read more »
-
Feb 27, 2021
There is no 100% anonymity on the internet. Your Digital Footprint is everywhere on the web: it is in all the actions you do on keyboard and mouse, on every tap and swipe on our mobile phone. All the tools… read more »
-
Feb 20, 2021
I often wake up in the morning with a melody in my head.It shouldn't be anything unusual, but in my case they are mostly original songs, which I transcribe and (when listenable) make available online. Over the years I have… read more »
-
Feb 13, 2021
Currently, there are a lot of good forensics commercial tools, can be used to perform a whole dfir workflow. However, several analyst anche companies cannot afford the purchase of those (awesome) tools. For this reason, all my dfir tutorial are… read more »
-
Feb 6, 2021
During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network. Many different types of data are present in the registry that can provide… read more »