Andrea Fortuna
AboutRss
  • Mar 5, 2018

    What is malicious cryptomining and how can i protect my computer from unwanted mining?

    2018's security trends: malicious cryptomining Malicious cryptomining, also sometimes called drive-by mining, is when someone else is using your computer to mine cryptocurrency like Bitcoin or Monero: essentially, they are stealing your resources to make money. [caption id="attachment_2762" align="alignnone" width="852"]… read more »
  • Mar 2, 2018

    Volatility tips: how to extract text typed in a notepad window from a Windows memory dump

    In a comment on my article Volatility, my own cheatsheet (Part 3): Process Memory, Fabrizio asked me: [...] da un dump di memoria su un sistema win7, ho rilevato che era in esecuzione notepad, è possibile visualizzarne il contenuto? ([...]… read more »
  • Feb 28, 2018

    Some thought about network printers security

    Network printers use a various amount of protocols and firmwares which differ from vendor to vendor and model to model. Obviously, every firmware (and protocol) could be vulnerable and exploitable but, a printer could be an attack vector? Why would… read more »
  • Feb 26, 2018

    Some thoughts about Docker security concerns

    Since 2014, the use of containers started making a big growth in IT, and especially in devops. The benefits are undeniable: flexibility and go-live times, small size of deployement images, task specific and reproducible containers. However when using a container… read more »
  • Feb 23, 2018

    Guitar technique: the right hand role during scales practice

    Scales are a valuable tool to improve the coordination between both hands and develop a fluent phrasing. Speed, sound, accuracy, articulation, dynamics these are all techniques that can be worked on with scales. In my opinion, the right hand should… read more »
  • Feb 21, 2018

    Forensic disk acquisition over the network

    In some occasions you need to acquire an image of a computer using a boot disk and network connectivity. Usually, this approach is made with a Linux boot disk on the machine under analysis, and another computer used as imaging… read more »
  • Feb 19, 2018

    ANY.RUN, a new tool for online malware analysis

    Dynamic and static malware analysis using a lot of preconfigured environments. ANY.RUN is an interactive online malware analysis service that allows both dynamic and static research using environments based on all Windows version from XP to 10, 32 and 64… read more »
  • Feb 16, 2018

    Forensic Timeline Creation: my own workflow

    Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine. Required tools Sleutkit Sleuth Kit is a collection of command line tools that allows you to analyze disk images. https://www.sleuthkit.org/sleuthkit/ Volatility The… read more »
  • Feb 14, 2018

    How to unprotect Excel Worksheet, in 5 simple steps

    Do you think that protect your Excel worksheet with password is safe? You are wrong! Starting with Office 2007, Excel files use the Open Office XML File Format. It’s an open standard, really well documented: http://www.ecma-international.org/publications/standards/Ecma-376.htm Each Excel workbook contains… read more »
  • Feb 12, 2018

    Malware hiding and evasion techniques

    Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis. Malware authors attempt to utilize techniques to… read more »
  • Feb 9, 2018

    USB Devices in Windows Forensic Analysis

    Parsing SetupAPI log for fun and profit! USB device history can be a great source of evidence during a forensic analysis, when an examiner needs to determine if an external device was connected to a system and how USB devices… read more »
  • Feb 7, 2018

    SimpleTwitter: small PHP class for search on Twitter

    Often i publish some small code snippets, usually written during development of large projects. Today i want to share a small PHP class that uses Twitter API in order to perform a search and downloads the most recents tweets. In… read more »
  • Feb 5, 2018

    Some thoughts about reverse shells

    During a penetration test, you could lucky enough to find a RCE vulnerability: in this case, the next step should be to obtain an interactive shell. One of the most used method is the creation of a reverse shell, useful… read more »
  • Feb 2, 2018

    5G Network Slicing and Network Neutrality: my point of view

    Let there be no mistake about this: from a technical point of view, 5G Network Slicing is totally awesome! However, some aspects seems to disagree with Network Neutrality principles. What is Network Neutrality? Network neutrality is the principle that Internet… read more »
  • Jan 31, 2018

    CVE-2018-0101: Cisco ASA WebVPN is affected by a serious flaw

    Cisco released security updates to address a critical security vulnerability in Cisco ASA software. UPDATED 2/5/2018 Cisco updated previous advisory: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it… read more »
  • Jan 29, 2018

    A Telegram Echo Bot built with a single PHP line

    Some weeks ago i've written a brief tutorial focused on building a simple Echo BOT on Telegram using Python. Today i want to share a very small snippet that implements the same Bot using PHP as responder for the Telegram's… read more »
  • Jan 26, 2018

    Windows PE run-time encryption with Hyperion

    Hyperion is a crypter for PE files, developed and presented by Christian Amman in 2012. The tool is a runtime crypter that can transform a Windows portable executables (PE) into an encrypted version that decrypts itself on startup and executes… read more »
  • Jan 24, 2018

    How a malware can be spread through webpages? A simple example made with python

    Recently a colleague asked me an example of how a malware can be spread using simple html pages hosted on a hacked website. So, there are a lot of techniques, but in this case I've choose to use for the… read more »
  • Jan 22, 2018

    Some interesting facts about reverse-engineering of x86 microcode, from a research by Ruhr University Bochum

    Micro­code is an ab­strac­tion layer on top of the phy­si­cal com­po­n­ents of a CPU and is pre­sent in most CPUs. It fa­ci­li­ta­te com­plex in­struc­tion sets, but it also pro­vi­des an up­date me­cha­nism that al­lows CPUs to be patched in-place wi­thout… read more »
  • Jan 19, 2018

    How to create a contextual menu on Windows Explorer for PyInstaller packaging

    Package your python application (for Windows and Linux) with just a right-click! Recently I've written a brief post about the packaging of a python script for Linux and Windows on a Linux machine, using PyInstaller and Wine. Today i want… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician