Andrea Fortuna
AboutRss
  • Mar 27, 2021

    Didier Stevens: finding Metasploit & Cobalt Strike URLs

    An interesting article and video lesson by security reserarcher Didier Stevens. Cobalt Strike and Metasploit are the offensive security tools most commonly used to host malware command-and-control (C2) servers: both tool allows generation of shellcode for http(s) shells so, during… read more »
  • Mar 21, 2021

    “Inertial Damper”, my new electronic album, is out!

    Strange sounds, delays, reverbs, noises: 13 instrumental, synthetic, ethereal songs. Available today on all major music streaming services, such as Apple Music and Spotify: https://open.spotify.com/album/45ynm44gnBRb6wMdNS9w8V I hope you enjoy it! … read more »
  • Mar 13, 2021

    Coding on iPad Pro: my own setup

    Some months ago, my loved Thinkpad x1 carbon started to have some issues on battery and motherboard. It was an 8 years laptop, so i decided to directly buy a new device for my "personal purposes" (all devices for work… read more »
  • Mar 6, 2021

    Some useful tips about /dev/tcp

    Just some simple tips that I found very useful. Bash supports read/write operations on a pseudo-device file /dev/tcp/[host]/[port] [1]. Writing to this special file makes bash open a tcp connection to host:port, and this feature may be used for some useful… read more »
  • Feb 27, 2021

    How to reduce your Digital Footprint, part 1: Web Browsers and Extensions

    There is no 100% anonymity on the internet. Your Digital Footprint is everywhere on the web: it is in all the actions you do on keyboard and mouse, on every tap and swipe on our mobile phone. All the tools… read more »
  • Feb 20, 2021

    ‘Deja Vu’, the mistery song

    I often wake up in the morning with a melody in my head.It shouldn't be anything unusual, but in my case they are mostly original songs, which I transcribe and (when listenable) make available online. Over the years I have… read more »
  • Feb 13, 2021

    How to perform a digital forensic analysis using only free tools

    Currently, there are a lot of good forensics commercial tools, can be used to perform a whole dfir workflow. However, several analyst anche companies cannot afford the purchase of those (awesome) tools. For this reason, all my dfir tutorial are… read more »
  • Feb 6, 2021

    Windows registry Transaction Logs in forensic analysis

    During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network. Many different types of data are present in the registry that can provide… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician