-
Mar 5, 2018
2018's security trends: malicious cryptomining Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money. [caption id="attachment_2762" align="alignnone" width="852"]… read more »
-
Mar 2, 2018
In a comment on my article Volatility, my own cheatsheet (Part 3): Process Memory, Fabrizio asked me: [...] da un dump di memoria su un sistema win7, ho rilevato che era in esecuzione notepad, è possibile visualizzarne il contenuto? ([...]… read more »
-
Feb 28, 2018
Network printers use a various amount of protocols and firmwares which differ from vendor to vendor and model to model. Obviously, every firmware (and protocol) could be vulnerable and exploitable but, a printer could be an attack vector? Why would… read more »
-
Feb 26, 2018
Since 2014, the use of containers started making a big growth in IT, and especially in devops. The benefits are undeniable: flexibility and go-live times, small size of deployement images, task specific and reproducible containers. However when using a container… read more »
-
Feb 23, 2018
Scales are a valuable tool to improve the coordination between both hands and develop a fluent phrasing. Speed, sound, accuracy, articulation, dynamics these are all techniques that can be worked on with scales. In my opinion, the right hand should… read more »
-
Feb 21, 2018
In some occasions you need to acquire an image of a computer using a boot disk and network connectivity. Usually, this approach is made with a Linux boot disk on the machine under analysis, and another computer used as imaging… read more »
-
Feb 19, 2018
Dynamic and static malware analysis using a lot of preconfigured environments. ANY.RUN is an interactive online malware analysis service that allows both dynamic and static research using environments based on all Windows version from XP to 10, 32 and 64… read more »
-
Feb 16, 2018
Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine. Required tools Sleutkit Sleuth Kit is a collection of command line tools that allows you to analyze disk images. https://www.sleuthkit.org/sleuthkit/ Volatility The… read more »
-
Feb 14, 2018
Do you think that protect your Excel worksheet with password is safe? You are wrong! Starting with Office 2007, Excel files use the Open Office XML File Format. It’s an open standard, really well documented: http://www.ecma-international.org/publications/standards/Ecma-376.htm Each Excel workbook contains… read more »
-
Feb 12, 2018
Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis. Malware authors attempt to utilize techniques to… read more »
-
Feb 9, 2018
Parsing SetupAPI log for fun and profit! USB device history can be a great source of evidence during a forensic analysis, when an examiner needs to determine if an external device was connected to a system and how USB devices… read more »
-
Feb 7, 2018
Often i publish some small code snippets, usually written during development of large projects. Today i want to share a small PHP class that uses Twitter API in order to perform a search and downloads the most recents tweets. In… read more »
-
Feb 5, 2018
During a penetration test, you could lucky enough to find a RCE vulnerability: in this case, the next step should be to obtain an interactive shell. One of the most used method is the creation of a reverse shell, useful… read more »
-
Feb 2, 2018
Let there be no mistake about this: from a technical point of view, 5G Network Slicing is totally awesome! However, some aspects seems to disagree with Network Neutrality principles. What is Network Neutrality? Network neutrality is the principle that Internet… read more »
-
Jan 31, 2018
Cisco released security updates to address a critical security vulnerability in Cisco ASA software. UPDATED 2/5/2018 Cisco updated previous advisory: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it… read more »
-
Jan 29, 2018
Some weeks ago i've written a brief tutorial focused on building a simple Echo BOT on Telegram using Python. Today i want to share a very small snippet that implements the same Bot using PHP as responder for the Telegram's… read more »
-
Jan 26, 2018
Hyperion is a crypter for PE files, developed and presented by Christian Amman in 2012. The tool is a runtime crypter that can transform a Windows portable executables (PE) into an encrypted version that decrypts itself on startup and executes… read more »
-
Jan 24, 2018
Recently a colleague asked me an example of how a malware can be spread using simple html pages hosted on a hacked website. So, there are a lot of techniques, but in this case I've choose to use for the… read more »
-
Jan 22, 2018
Microcode is an abstraction layer on top of the physical components of a CPU and is present in most CPUs. It facilitate complex instruction sets, but it also provides an update mechanism that allows CPUs to be patched in-place without… read more »
-
Jan 19, 2018
Package your python application (for Windows and Linux) with just a right-click! Recently I've written a brief post about the packaging of a python script for Linux and Windows on a Linux machine, using PyInstaller and Wine. Today i want… read more »