-
May 7, 2018
What is Domain Fronting? How it works? How can be used to evade internet censorship? Recently both Google and Amazon announced a change to its own infrastructure in order to avoid the use of domain fronting, the exploitation of a… read more »
-
May 4, 2018
When teaching music, one of the biggest challenge is to keep students constantly interested. Playing an instrument is also a muscular exercise, and the muscles must be trained. So, especially at the beginning of the cycle of studies, long technical… read more »
-
May 2, 2018
File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. This practice allows searching files or other kinds of objects based on content, rather than on metadata, for example for recovering files and… read more »
-
Apr 30, 2018
The security researcher Marius Tivadar has discovered a vulnerability on Windows NTFS filesystem and published a proof-of-concept code on GitHub that could be used to cause Blue Screen of Death within seconds on most Windows computers. One can generate blue-screen-of-death… read more »
-
Apr 27, 2018
“A mind is like a parachute. It doesn't work if it is not open.” (F. Zappa) On May 17, 1988, Frank Zappa and his band performed an awesome concert at the Palace of Sports of Barcelona: an extremley interesting concert,… read more »
-
Apr 25, 2018
Some days ago i've written about AWS S3 security concerns, with a post about some tools to find unsecured buckets. Today i've read on infosec Island this article by Sanjay Kalra, focused precisely on S3 security, with a useful security… read more »
-
Apr 23, 2018
The Windows Subsystem for Linux (WSL) is a great feature introduced in Windows 10. Is a compatibility layer for running Linux binary executables natively on Windows 10, and allows the use of a rather real linux installation, without using a… read more »
-
Apr 20, 2018
Paul Galbraith is an outstanding artist, especially in his interpretation of J.S. Bach. Galbraith, with the help of the great luthier David Rubio, has developed an entirely new type of guitar, the “Brahms guitar”, with eight strings (it adds a… read more »
-
Apr 18, 2018
Some interesting scripts, probably outdated but still useful. In 2012 Jacky Fox, on her MSc dissertation focused on extraction and correlation of Windows registry artifacts. During her research she realised a set of bash script for forensic interpretation of Windows… read more »
-
Apr 16, 2018
It's not a mystery: raw JSON it's not really readable! So, when you need to process a JSON array from command line, it's a good idea using some helpful tools. Here my own shortlist of command line tools for JSON… read more »
-
Apr 13, 2018
A funny and interesting TED-ED Talk! (post image courtesy of Ivo The Cat) I've never made a secret of my love for cats, and I really enjoyed this TED talk in which Tony Buffington explains the science behind some of… read more »
-
Apr 11, 2018
Often, during a forensic analysis, you may need to explore an EWF image (usually a file with .E0X extension) in order to extract some artifacts. EWF files (Expert Witness Format) are a type of disk image, that contain the contents… read more »
-
Apr 9, 2018
My own suggestions about keeping a Digital Chain of Custody In forensic scope, the "chain of custody" refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic… read more »
-
Apr 6, 2018
Effective practice isn't just a physical exercise: most of the effectiveness it's in the mind too. From my point of view, is really important to understand that playing and practicing guitar is not the same thing. When you are playing… read more »
-
Apr 4, 2018
Services like Amazon’s S3 have made it easier and cheaper than ever to store large quantities of data in the cloud. Used properly, S3 buckets are a useful tool, however a lot of companies fail to implement basic security resulting… read more »
-
Mar 30, 2018
Left hand slurs are an essential part of a good technical practice. In this first post i will share one of my own slur exercises, involving two fingers. Slur practice can be very fatiguing. I would recommend practicing slow and… read more »
-
Mar 28, 2018
Some days ago, during a chat with a friend who works in a small software development company, the webshells topic has come up. During the migration of a production system, my friend found some suspicious .php files, which turned out… read more »
-
Mar 26, 2018
A new technique, called "Internal Monologue Attack", allows and attack similar to Mimikatz without dumping memory area of LSASS process, avoiding antivirus and Windows Credential Guard. Mimikatz is a well-known tool which allows attackers to extract plain text passwords from LSASS… read more »
-
Mar 23, 2018
Sometimes, Youtube suggest me guitar related videos, and in most cases are very interesting contents. Yesterday, the first suggestion is a long video lesson by Abel Carlevaro: i believe is a good idea share it. Who is Abel Carlevaro? Abel… read more »
-
Mar 21, 2018
Some thought about Cambridge Analytica and Facebook privacy settings. Recently Facebook revealed in a blog post that it suspended Cambridge Analytica and Strategic Communication Laboratories accounts for illegally accessing and sharing user data more than two years ago. Cambridge Analytica… read more »