-
Jan 31, 2018
Cisco released security updates to address a critical security vulnerability in Cisco ASA software. UPDATED 2/5/2018 Cisco updated previous advisory: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it… read more »
-
Jan 29, 2018
Some weeks ago i've written a brief tutorial focused on building a simple Echo BOT on Telegram using Python. Today i want to share a very small snippet that implements the same Bot using PHP as responder for the Telegram's… read more »
-
Jan 26, 2018
Hyperion is a crypter for PE files, developed and presented by Christian Amman in 2012. The tool is a runtime crypter that can transform a Windows portable executables (PE) into an encrypted version that decrypts itself on startup and executes… read more »
-
Jan 24, 2018
Recently a colleague asked me an example of how a malware can be spread using simple html pages hosted on a hacked website. So, there are a lot of techniques, but in this case I've choose to use for the… read more »
-
Jan 22, 2018
Microcode is an abstraction layer on top of the physical components of a CPU and is present in most CPUs. It facilitate complex instruction sets, but it also provides an update mechanism that allows CPUs to be patched in-place without… read more »
-
Jan 19, 2018
Package your python application (for Windows and Linux) with just a right-click! Recently I've written a brief post about the packaging of a python script for Linux and Windows on a Linux machine, using PyInstaller and Wine. Today i want… read more »
-
Jan 17, 2018
LaZagne is a tool developed by Alessandro Zanni useful to retrieve passwords stored on a local computer by most commonly-used software. The tool displays passwords for (currently) 22 Windows and 12 Linux programs. Each software stores its passwords using different… read more »
-
Jan 15, 2018
PE-sieve is a small tool for investigating inline hooks and other in-memory code patches, developed by hasherezade. The tool, based on libpeconv (also developed by hasherezade), scans a given process and searching for the modules containing in-memory code modifications. When… read more »
-
Jan 12, 2018
Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal and Niraj Jha, in paper recently published, describe a new user-location mechanism that exploits non-sensory/sensory data stored on the smartphone to estimate the user's location when all location services are turned off. The technique,… read more »
-
Jan 10, 2018
Recently at Black Hat Europe conference, Tal Liberman and Eugene Kogan (enSilo lab) presented a a new code injection technique called "Process Doppelgänging", that works on all Windows versions and seems to be able to bypass most of today's major… read more »
-
Jan 8, 2018
Pavel Boldin published a new PoC exploit of Meltdown vulnerability working on Linux, written in C. "Speculative optimizations execute code in a non-secure manner leaving data traces in microarchitecture such as cache." Can only dump linux_proc_banner at the moment, since… read more »
-
Jan 6, 2018
In-Spectre-Meltdown is a PoC developed by Viral Maniar using Python and Powershell to check speculative execution side-channel attacks that affect many modern processors and operating systems designs that allows unprivileged processes to steal secrets from privileged processes. This tool is based on… read more »
-
Jan 5, 2018
In the last hours, the vulnerabilities of the CPU have had a great prominence even in the non-specialized press.So, I think that would be useful trying to summarize the situation in a simple way. Background https://xkcd.com/1938/ Google's Project Zero releases… read more »
-
Jan 3, 2018
Keyloggers are often used by malicious softwares to steal sensitive data and login credentials. During a malware analysis process is useful to know how a keylogger works. A keylogger can be implemented simply setting a hook on the keydown event… read more »
-
Dec 31, 2017
My running year recap. Ok, 2018 is near to ends, now is time to make some statistics on my running activity. This year i have run for 5279 kilometers (3280 miles): every workout has been performed in the early morning,… read more »
-
Dec 29, 2017
In digital forensics, the term logical extraction is typically used to refer to extractions that do not recover deleted data, or do not include a full bit-by-bit copy of the evidence, analogously to copying and pasting a folder in order… read more »
-
Dec 27, 2017
Using Wine and Pyinstaller. Pyinstaller is a program that packages Python programs into stand-alone executables, under the most used OSs (Windows, Linux, Mac OS X, FreeBSD, Solaris and AIX). Initially Pyinstaller had a beta feature that allows the cross-compilation of… read more »
-
Dec 22, 2017
Every forensic analyst, during his experience, perfects his own workflow for the acquisition of forensic images. Today I want to propose my own workflow for acquisition of physical disks on Microsoft Windows systems Required tools FTK Imager The Forensic Toolkit… read more »
-
Dec 20, 2017
Microsoft has released, on its GitHub repository, an interesting Linux porting of ProcDump from Sysinternals suite. Like the Windows version, ProcDump allows developers to create core dumps of their application based on performance triggers. Furthermore, ProcDump is also useful for… read more »
-
Dec 18, 2017
In this great speech on BlackHat Europe 2017, Mark Ermolov and Maxim Goryachy by Positive Technology talks about the Intel Management Engine subsystem and how the recently discovered vulnerabilities can be used in order to compromise a system. Intel Management… read more »