Andrea Fortuna
AboutRss
  • Jun 8, 2018

    How to check your website for GDPR compliance, from command line!

    On 25th May 2018, the GDPR (General Data Protection Regulation) enacted by the EU has come into effect. A lot of webmasters spent (and will spend) a lot of time in order to make websites compliant: a lot of checks… read more »
  • Jun 6, 2018

    Dumpzilla: a forensic tool to extract information from browsers based on Firefox

    Dumpzilla is a Python 3 script developed to extract artifacts from Firefox, Iceweasel and Seamonkey browsers, useful durgin a forensic analysis. It works in command line under Unix and Windows 32/64 bits systems. Supported artifacts Cookies + DOM Storage (HTML… read more »
  • Jun 4, 2018

    Using MFT anomalies to spot suspicious files in forensic analysis

    A typical NTFS filesystem contains hundreds of thousands of files. Each file has its own $MFT entry, and all $MFT entries are given a sequential address starting from zero, zero being the $MFT entry itself. Each MFT entry is addressed… read more »
  • Jun 1, 2018

    "Ludovico Technique", a simple guitar study for beginners

    A very basic fingerstyle piece composed for my guitar students: a little study inspired by a melody by Ludovico Einaudi. Another brief and simple piece composed for my beginners students, this time based on rithmic structure of the well known… read more »
  • May 30, 2018

    How to check Cloudflare cache status programmatically

    Just imagine: your small web app, that allows user to download medium-large ZIP files, due a lucky reddit post, suddenly start to receive huge amount of traffic, and specifically a lot of downloads. The server is a small tier with… read more »
  • May 28, 2018

    How to install (and run) tcpdump on Android devices

    When performing the analysis of a malicious Android program directly on the device, often can be required to dump some network traffic. This operation is pretty simple when the device is connected to a wifi network managed by the analyst,… read more »
  • May 25, 2018

    Happy Towel (and GDPR) Day!

    Every year, on May 25, i write a small post celebrating the Towel Day, but this time there is also a further event! Towel Day is an annual tribute to the late author Douglas Adams (1952-2001): on that day, fans… read more »
  • May 23, 2018

    Forensic Artifacts: evidences of program execution on Windows systems

    During a forensic analysis of a Windows system, it is often critical to understand when and how a particular process has been started. In order to identify this activity, we can extract from the target system a set of artifacts… read more »
  • May 21, 2018

    Malware VM detection techniques evolving: an analysis of GravityRAT

    The malware detects virtualized environments by taking infected machines' CPU temperature. When a malware infect a system, one of the next steps that it performs is gain persistence, a mandatory key to ensure the resilience of (for example) the connection… read more »
  • May 18, 2018

    Alexandr Misko at TEDxMannheim

    Alexandr Misko, 20 years old, a great percussive-fingerstyle technique and a successful career as a musician. Misko first caught the public's attention with an home recorded video, where he plays an original guitar piece with a "pentapping" base: https://www.youtube.com/watch?v=F1V3Pt7aFnI After,… read more »
  • May 16, 2018

    Exploiting SUDO for Linux privilege escalation

    Abusing SUDO for fun and profit! The SUDO (Substitute User and Do) command allows users to delegate privileges resources: users can execute specific commands under other users (also root) using their own passwords instead of user’s one or without password… read more »
  • May 14, 2018

    Some thoughts about RDP protocol, from the point of view of cybersecurity

    Microsoft Terminal Services Remote Desktop Protocol (RDP) is a great feature that allows the interactive use or administration of a remote Windows system. However, it can be also used by an attacker, with compromised domain credentials, to move laterally across… read more »
  • May 11, 2018

    "Manhã de Carnaval", a simple fingerstyle guitar rendition

    Often to my guitar students i try to propose both pieces from standard course of study, and small exercises based on modern and famous themes. Usually, I take personally care of the transcription and arrangement of the songs, and today… read more »
  • May 9, 2018

    How to automatically attach tmux in SSH session

    Let us say it frankly: TMUX is a great console tool! TMUX is a terminal multiplexer, allowing a user to access multiple separate terminal sessions inside a single terminal window or remote terminal session: like GNU Screen, but with more… read more »
  • May 7, 2018

    Domain Fronting in a nutshell

    What is Domain Fronting? How it works? How can be used to evade internet censorship? Recently both Google and Amazon announced a change to its own infrastructure in order to avoid the use of domain fronting, the exploitation of a… read more »
  • May 4, 2018

    "13 measures", a brief fingerstyle study for beginners

    When teaching music, one of the biggest challenge is to keep students constantly interested. Playing an instrument is also a muscular exercise, and the muscles must be trained. So, especially at the beginning of the cycle of studies, long technical… read more »
  • May 2, 2018

    Some thoughts about file carving

    File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. This practice allows searching files or other kinds of objects based on content, rather than on metadata, for example for recovering files and… read more »
  • Apr 30, 2018

    Dumb bug on NTFS.sys triggers a BSOD when Windows attempts to mount a malformed disk image

    The security researcher Marius Tivadar has discovered a vulnerability on Windows NTFS filesystem and published a proof-of-concept code on GitHub that could be used to cause Blue Screen of Death within seconds on most Windows computers. One can generate blue-screen-of-death… read more »
  • Apr 27, 2018

    Frank Zappa: live at the Palace of Sports of Barcelona in 1988

    “A mind is like a parachute. It doesn't work if it is not open.” (F. Zappa) On May 17, 1988, Frank Zappa and his band performed an awesome concert at the Palace of Sports of Barcelona: an extremley interesting concert,… read more »
  • Apr 25, 2018

    AWS Tips: a security checklist for S3 buckets

    Some days ago i've written about AWS S3 security concerns, with a post about some tools to find unsecured buckets. Today i've read on infosec Island this article by Sanjay Kalra, focused precisely on S3 security, with a useful security… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician