Andrea Fortuna
AboutRss
  • Jul 9, 2018

    Nano text editor: my own cheatsheet

    Which is the best command line text editor? Seriously, i don't know! In my opinion, the best choice depends by the context: undoubtedly EMACS is the most complex and comprehensive, and VIM is the right balance between features and simplicity.… read more »
  • Jul 6, 2018

    Suggested listenings: "Villa-Lobos plays Villa-Lobos"

    Recently i have found on YouTube some wonderful recordings of Heitor Villa-Lobos playing his own music. https://www.youtube.com/watch?v=KLbZLmIhggA https://www.youtube.com/watch?v=UZkEYK4WKKg The recordings seems to be extracted from the CD Villa Lobos Plays Villa-lobos, published by Sanctus Records and also available on Spotify:… read more »
  • Jul 4, 2018

    Docker images under cryptojacking attack: how to check if a downloaded image is safe

    Researchers at Kromtech Security Center discovers seventeen malicious Docker containers with embedded cryptominer applications that permitted to cybercriminals to earn $90,000 in 30 days. According to the Kromtech's report, containers are shaping up to be the next target for these… read more »
  • Jul 2, 2018

    Bash scripting: my own cheatsheet

    bash (Bourne Again shell) is the standard GNU shell, a powerful tool for the advanced and professional user. This shell is a so-called superset of the Bourne shell, a set of add-ons and plug-ins. This means that the Bourne Again… read more »
  • Jun 29, 2018

    "Into The Flow", a new brief fingerstyle study

    This little piece has an interesting story. Many years ago i played guitar for a brief period in a melodic rock group that tried to propose some original songs. In this period i have written some original instrumental pieces but,… read more »
  • Jun 27, 2018

    Pay attention to unknown USB sticks!

    Some days ago, with a colleague, i've talked about the real usefulness of USB hardware locks on critical clients/servers. USB Locks are tools that allows to completely avoid the use of USB ports using a simple padlock. Well, in my… read more »
  • Jun 25, 2018

    Google App Engine and Python: a correct way to store configuration variables

    When you develop an application, often you could need to store some configurations. This data can contain a lot of sensitive informations, and this is a critical point if your sourcecode is hosted on a GitHub repository. In fact, a… read more »
  • Jun 22, 2018

    Andrés Segovia’s daily practice routine

    It's not a mistery: a musician needs to spend time with the instrument. If you don’t practice enough, your progress will be much slower than a person who practices more. This leads us to the question: how long should I… read more »
  • Jun 20, 2018

    Malware analysis: Gargoyle, a memory scanning evasion technique

    Gargoyle is a memory analysis evasion technique that uses return-oriented programming (RoP) for hiding all of a program’s executable code in non-executable memory when it is inactive, and temporarily mark it executable to do some work at a pre-defined interval… read more »
  • Jun 18, 2018

    Fun with network protocols, using Python and Impacket

    Impacket is a collection of Python classes, developed by Core Security, for working with network protocols, which provides a low-level programmatic access to the packets and, for some protocols such us SMB1-3 and MSRPC, the protocol implementation itself. The library… read more »
  • Jun 15, 2018

    Stock-market fraud, steganography and cyberattacks...in 1834! The fascinating tale of Blanc brothers

    When the first hacking of a telecommunication system occurred? In 1834, according to this article by Tom Standage! At that time there was no Internet or computers, but since 1794 France had its own national telecommunications network: a semaphore telegraph,… read more »
  • Jun 13, 2018

    Analysing Active Directory event logs to identify compromised accounts

    During investigation in a security incident, event log analysis is a key element. If the affected network is managed by Active Directory, identify compromised accounts is a critical step. For such investigation, because is quite difficult to conduct detailed analysis… read more »
  • Jun 11, 2018

    Powercat: a porting of Netcat written in Powershell

    With some useful enhanced features! Netcat is a "venerable"network tool, dubbed "the TCP/IP swiss army knife". It's an open source UNIX utility written in C (but also available on a great number of OSs) for performing network related tasks, really… read more »
  • Jun 8, 2018

    How to check your website for GDPR compliance, from command line!

    On 25th May 2018, the GDPR (General Data Protection Regulation) enacted by the EU has come into effect. A lot of webmasters spent (and will spend) a lot of time in order to make websites compliant: a lot of checks… read more »
  • Jun 6, 2018

    Dumpzilla: a forensic tool to extract information from browsers based on Firefox

    Dumpzilla is a Python 3 script developed to extract artifacts from Firefox, Iceweasel and Seamonkey browsers, useful durgin a forensic analysis. It works in command line under Unix and Windows 32/64 bits systems. Supported artifacts Cookies + DOM Storage (HTML… read more »
  • Jun 4, 2018

    Using MFT anomalies to spot suspicious files in forensic analysis

    A typical NTFS filesystem contains hundreds of thousands of files. Each file has its own $MFT entry, and all $MFT entries are given a sequential address starting from zero, zero being the $MFT entry itself. Each MFT entry is addressed… read more »
  • Jun 1, 2018

    "Ludovico Technique", a simple guitar study for beginners

    A very basic fingerstyle piece composed for my guitar students: a little study inspired by a melody by Ludovico Einaudi. Another brief and simple piece composed for my beginners students, this time based on rithmic structure of the well known… read more »
  • May 30, 2018

    How to check Cloudflare cache status programmatically

    Just imagine: your small web app, that allows user to download medium-large ZIP files, due a lucky reddit post, suddenly start to receive huge amount of traffic, and specifically a lot of downloads. The server is a small tier with… read more »
  • May 28, 2018

    How to install (and run) tcpdump on Android devices

    When performing the analysis of a malicious Android program directly on the device, often can be required to dump some network traffic. This operation is pretty simple when the device is connected to a wifi network managed by the analyst,… read more »
  • May 25, 2018

    Happy Towel (and GDPR) Day!

    Every year, on May 25, i write a small post celebrating the Towel Day, but this time there is also a further event! Towel Day is an annual tribute to the late author Douglas Adams (1952-2001): on that day, fans… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician