Andrea Fortuna
AboutRss
  • Aug 9, 2017

    Windows Command Line cheatsheet (part 2): WMIC

    This command-line tool is really useful for both penetration testing and forensics tasks The previous article has raised interest in readers regarding WMIC.So I decided to write an article dedicated to this tool. If you’ve done any scripting for the… read more »
  • Aug 7, 2017

    Volatility, my own cheatsheet (Part 7): Analyze and convert crash dumps and hibernation files

    Volatility supports memory dumps in several different formats, to ensure the highest compatibility with different acquisition tools. You can analyze hibernation files, crash dumps, virtualbox core dumps, etc in the same way as any raw memory dump and Volatility will… read more »
  • Aug 4, 2017

    How frustration can make us more creative

    An inspiring TED talk by Tim Harford, about how challenges and problems can make you more creative than ever. Starting talking about a Keith Jarrett’s concert, Tim Harford try to convince you of the advantages of having to work with a… read more »
  • Aug 3, 2017

    Windows Command Line cheatsheet (part 1): some useful tips

    Yes, also Windows can be used by command line… Today I propose a brief list of useful Windows CLI commands for daily use Windows Registry Adding Keys and Values C:>reg add [\TargetIPaddr][RegDomain][Key] Add a key to the registry on machine [TargetIPaddr] within… read more »
  • Aug 2, 2017

    Boost your console productivity on tmux

    With “ Oh My Tmux!”, a self-contained, pretty and versatile tmux configuration file tmux is a tool that can be used to multiplex several virtual consoles, allowing a user to access multiple separate terminal sessions inside a single terminal window… read more »
  • Aug 1, 2017

    “This is what the future will look like “

    A really inspiring post written by Udo Gollub Yesterday, on my Facebook stream, i’ve seen this post: [embed]https://www.facebook.com/alessandro.mininno/posts/1388047444576236[/embed] It’s the italian translation of a post made by Udo Gollub, on his profile. I think that is a really interesting reading, and… read more »
  • Jul 31, 2017

    Volatility, my own cheatsheet (Part 6): Windows Registry

    Volatility has the ability to carve the Windows registry data. (Other articles about Volatility: https://www.andreafortuna.org/category/volatility) hivescan To find the physical addresses of CMHIVEs (registry hives) in memory, use the hivescan command. For more information: Enumerating Registry Hives The Windows registry can… read more »
  • Jul 27, 2017

    FLARE VM: a Windows-based security distribution for malware analysis, incident response and…

    A fully configured platform with open source tools FLARE VM is a freely available and open sourced Windows-based security distribution for reverse engineering, malware analysis, incident response, forensics analysis, and penetration tests. FLARE VM delivers a fully configured platform with a… read more »
  • Jul 25, 2017

    bulk_extractor: extract useful information without parsing the file system

    A fast and thorough forensic tool bulk_extractor is a computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system structure. Using this approach, bulk_extractor is more fast… read more »
  • Jul 24, 2017

    Volatility, my own cheatsheet (Part 5): Networking

    This time we try to analyze the network connections, valuable material during the analysis phase. connections To view TCP connections that were active at the time of the memory acquisition, use the connections command. This walks the singly-linked list of… read more »
  • Jul 21, 2017

    BaTbot: Telegram Bot written in bash script

    Can i manage my home-server using Telegram? batbot.sh is a bash Telegram Bot developed by Andrea Menin. It can reply to user messages, execute commands, and others cool features. [embed]https://www.youtube.com/watch?v=CZbD49nzWSE[/embed] Usage ./botbat.sh [-t "<token>"] [-c <seconds>] ./botbat.sh -h -t Set… read more »
  • Jul 20, 2017

    How to recover event logs from a Windows memory image

    Using Volatility and EVTXtract Usually i use a different approach based on Windows version: Windows XP and 2003 machines Simply use the evtlogs plugin of Volatility: The evtlogs command extracts and parses binary event logs from memory. Binary event logs are… read more »
  • Jul 19, 2017

    XRay: a great network OSINT gathering tool

    Really useful in the first phases of a penetration test XRay is a tool for network OSINT gathering developed by Simone Margaritelli, useful to make initial tasks of information gathering and network mapping. It make a bruteforce of subdomains using… read more »
  • Jul 18, 2017

    How to extract data and timeline from Master File Table on NTFS filesystem

    The most important file in a NTFS filesystem During a forensics analysis, after evidence acquisition, the investigation starts by doing a timeline analysis, that extract from the images all information on when files were modified, accessed, changed and created. Different… read more »
  • Jul 17, 2017

    Volatility, my own cheatsheet (Part 4): Kernel Memory and Objects

    Let’s go down a bit more deeply in the system, and let’s go to find kernel modules into the memory dump. modules To view the list of kernel drivers loaded on the system, use the modules command. This walks the… read more »
  • Jul 16, 2017

    “Light of the Seven” from Game Of Thrones soundtrack: my guitar transcription

    A simple piece, good for novice students Tonight is the night! The sixth season of Game Of Thrones ends with a big explosion and a beautiful music theme written by Ramin Djawadi. Often to my guitar students I propose small studies… read more »
  • Jul 14, 2017

    Ultra-Geek Linux Laptop: my own setup

    Some days ago i’ve written a post about the “Ultra-Geek” Linux Workstation developed by Joe Nelson. Reading his post, I found many similarities with the current configuration of my laptop. So I decided to share the setup of my ‘Ultra-Geek… read more »
  • Jul 13, 2017

    jq: a lightweight and flexible command-line JSON processor

    Like ‘sed’, for JSON data jq is like sed for JSON data - you can use it to slice and filter and map and transform structured data with the same ease that sed, awk, grep and friends let you play with… read more »
  • Jul 12, 2017

    Hindsight: Internet history forensics for Google Chrome/Chromium

    An Open Source tool for analyzing web artifacts. Hindsight is a open source tool for parsing a user’s Chrome browser data. Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill… read more »
  • Jul 11, 2017

    Bitscout — The Free Remote Digital Forensics Tool Builder

    Kaspersky Releases an Open Source Digital Forensics Tool Bitscout initially started as a hobby project a few years ago (version 1.0 was never released to the public), and it has been continually improved based on the requirements that arose in… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician