Andrea Fortuna
AboutRss
  • Dec 15, 2017

    Investigate suspicious Windows processes using Sysinternals Sysmon

    This article on Microsoft's Technet Blog is really interesting: Moti Bani explain how to investigate suspicious activity on servers using Sysmon Tool. What is Sysmon? Sysmon is a tool from Sysinternals that provides a comprehensive monitoring about activities in the… read more »
  • Dec 13, 2017

    How to fix the WXR version error when importing a very old Wordpress export file

    Recently I needed to migrate the contents of a Wordpress 2.1.7 (really old!) on a new installation based on Wordpress 4.9.1. So i've exported all contents from old site using the standard export procedure, but during the import on the… read more »
  • Dec 11, 2017

    Metasploit Console: my own cheatsheet

    Metasploit Framework is a priceless open-source a tool for developing and executing exploit code against a remote target machine. Its main admin interface, the Metasploit console has many different command options to chose from. Here my own set (in alphabetical… read more »
  • Dec 8, 2017

    What is Reflective DLL Injection and how can be detected?

    DLL (Dynamic-link library) are the Microsoft's implementation of the shared library concept and provide a mechanism for shared code and data, allowing a developer of shared code/data to upgrade functionality without requiring applications to be re-linked or re-compiled. DLLs may… read more »
  • Dec 6, 2017

    Just some thoughts about credential stuffing attacks: how to check and prevent them

    People reuse passwords all the time. How can i check and prevent credential stuffing attacks? Recently i've read this article by Brian Chappell on SC Media UK: Credential stuffing: People reuse passwords all the time. Shocker, I know. In BeyondTrust's… read more »
  • Dec 4, 2017

    How to learn programming: the traditional way and the quick way

    Do you want to become a programmer? You need to know that you will have to face a long and difficult course, full of nights spent for debugging. Furthermore, you also need to face relationships with colleagues and clients, time… read more »
  • Dec 1, 2017

    Determine age, region, source of leaked credentials using RadioCarbon

    RadioCarbon is an interesting tool developed by Florian Roth, focused on checking age and origin of a credential leak: Typically you get leaked credentials in form of list of email addresses or user names, cleartext passwords or password hashes, and… read more »
  • Nov 29, 2017

    Yes, you can log into macOS "High Sierra" as root with no password

    UPDATE - Apple released the security patch for the bug: https://support.apple.com/en-us/HT208315 The security fate discovered in MacOS High Sierra by Lemi Orhan Ergin is so serious that it is hard to believe it's real: you can become root without typing… read more »
  • Nov 29, 2017

    How to build a simple Echo Bot on Telegram using hook.io and Python

    Please note: This article has been written almost a year ago: in this months a lot of updates and bugfixes has been rolled up on hook.io infrastructure.So it's quite possible that the code snippets related to hook.io do not work correctly.I… read more »
  • Nov 28, 2017

    CVE-2017-16943: Exim Remote Code Execution Vulnerability

    Two vulnerabilities and an exploit POC impacting the Exim MTA have been publicly disclosed, identified as CVE-2017-16943 & CVE-2017-16944 The vulnerabilities could allow remote attackers to execute arbitrary code or cause a denial of service via vectors involving BDAT commands.… read more »
  • Nov 27, 2017

    How a malware can download a remote payload and execute malicious code...in one line?

    This post on arno0x0x's blog is awesome: an accurate analysis of some 'one-line commands' that can be used on a windows system in order to download a malicious payload and execute it. The examples are developed using several script languages,… read more »
  • Nov 24, 2017

    How to recover a broken FAT filesystem using FatCat

    FatCat is a tool designed to manipulate FAT filesystems, in order to explore, extract, repair, recover and forensic them. FatCat is developed and mantained by Grégoire Passault, and currently supports FAT12, FAT16 and FAT32. (more information about FAT filesystem here)… read more »
  • Nov 23, 2017

    CVE-2017-14746: you need to patch your Samba as soon as possible!

    A fresh advisory from SAMBA.org: All versions of Samba from 4.0.0 onwards are vulnerable to a use after free vulnerability, where a malicious SMB1 request can be used to control the contents of heap memory via a deallocated heap pointer.… read more »
  • Nov 22, 2017

    RunPE: a practical example of Process Hollowing technique

    About the "Process Hollowing" i have already written some posts (like this). However, i've never published any practical example. So, today i want to quote this interesting article where Tigzy explains the process hollowing with a brief code snippet. in… read more »
  • Nov 20, 2017

    Securing your system with Quad9 DNS

    Quad9 is a free security solution that uses DNS to protect systems against the most common cyber threats. Its is developed in collaboration with IBM, Packet Clearing House and Global Cyber Alliance. How it works? Quad9 routes your DNS queries… read more »
  • Nov 18, 2017

    Things to watch: NOTHING TO HIDE - The documentary about surveillance and you

    NOTHING TO HIDE  is an independent documentary dealing with surveillance and its acceptance by the general public through the "I have nothing to hide" argument. The documentary is written, produced and directed by two journalists living in Berlin, Marc Meillassoux… read more »
  • Nov 17, 2017

    Santoku, a linux distribution for Android forensic analysis

    Santoku is a bootable linux distribution focused on mobile forensics, analysis, and security. It comes with pre-installed platform SDKs, drivers and utilities and allows auto detection and setup of new connected mobile devices. Santoku Linux is a free and open… read more »
  • Nov 15, 2017

    How to retrieve user's passwords from a Windows memory dump using Volatility

    About Volatility i have written a lot of tutorials, now let's try to use this information in a real context extracting the password hashes from a windows memory dump, in 4 simple steps. 1. Identify the memory profile First, we… read more »
  • Nov 13, 2017

    SQLiv: a massive SQL injection scanner

    SQLiv is a Python-based scanning tool that uses Google, Bing or Yahoo for targetted scanning, focused on reveal pages with SQL Injection vulnerabilities. It uses known dorks in order to find vulnerable URLs. Features multiple domain scanning with SQL injection… read more »
  • Nov 10, 2017

    Cloud Security Suite: auditing the security of a AWS infrastructure

    CS Suite is tool for auditing the security posture of the AWS infrastructure, using current open source tools capabilities. Features Simple installation with support of python virtual environment and docker containers Initiate all tools/audit checks in one go AWS Infra… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician