Andrea Fortuna
AboutRss
  • Sep 13, 2017

    How to verify that Wannacry patch is correctly installed

    In a big company, with a lot of windows systems, checking the correct patching for Wannacry could be a little tricky. Security update MS17–010 addresses several vulnerabilities in Windows SMB v1 exploited by the WannaCrypt ransomware. However, the KB that contains… read more »
  • Sep 11, 2017

    DolphinAttack: inaudible voice commands allows attackers to control Siri, Alexa and other digital assistants

    A research about supersonic voice command hacking Chinese researchers have discovered a vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. Using a technique called “DolphinAttack”, a team from Zhejiang University translated typical vocal commands into ultrasonic frequencies… read more »
  • Sep 8, 2017

    LiMEaide: remotely dump RAM of a Linux client

    Simplify Linux digital forensics! LiMEaide is a python application developed by Daryl Bennett that can remotely dump RAM of a Linux client. It can also create a volatility profile for later analysis. In order to use LiMEaide all you need… read more »
  • Sep 6, 2017

    UniByAv: shellcode obfuscation using Python

    Applying XOR on a raw shellcode UniByAv is a simple obfuscator that take a raw shellcode and generate executable that are Anti-Virus friendly, really useful to check antivirus solutions. The obfuscation routine is purely writtend in assembly to remain pretty… read more »
  • Sep 4, 2017

    GitHub Dorks, a simple cheatsheet

    Search for sensitive data in GitHub repositories Developers generally like to share their code, and many of them do so by open sourcing it on GitHub. From Wikipedia: GitHub is a web-based Git or version control repository and Internet hosting… read more »
  • Sep 1, 2017

    PowerForensics: a PowerShell framework for hard drive forensic analysis

    Simple to install and with a lot of features The purpose of PowerForensics is to provide an all inclusive framework for hard drive forensic analysis. PowerForensics currently supports NTFS and FAT file systems, and work has begun on Extended File System… read more »
  • Aug 31, 2017

    Tired of the wait for new book of “A Song of Ice and Fire”?

    And not all of the predictions are completely off-base: some computer-generated theories that have been talked about by fans of the show. Readers of the “A Song of Ice and Fire” novel series on which the TV show is based… read more »
  • Aug 31, 2017

    Raven: a tool for gathering information about company employees using google and Linkedin

    Useful during a pentest Raven is a tool developed by 0x09AL to gather information about an organization employees using Linkedin. It’s developed using python, Selenium e geckodriver Features Automatically check found emails in haveibeenpwned.com Output in CSV format Installation Simply run… read more »
  • Aug 30, 2017

    NoSQL database enumeration and exploitation with NoSQLMap

    Like sqlmap, but for non-relational databases! NoSQLMap is a tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases as well as web applications using NoSQL in order to disclose data… read more »
  • Aug 29, 2017

    Kaki King: two short videos recorded at TED conferences

    “A musical escape into a world of light and color” Today I want to share two videos from TED.com featuring Kaki King (born Katherine Elizabeth King), a guitarist and composer known for her percussive technique applied on multiple tunings on acoustic… read more »
  • Aug 28, 2017

    Linux Distributions for forensics investigation: my own list

    A shortlist of six distribution…guess my favorite! During a digital forensics analysis, a lot of different tools can be used, and it could be useful use a dedicated linux distribution with all tools already installed and configured. Here a brief… read more »
  • Aug 25, 2017

    “Spaghetti”, a Python Web Application security scanner

    Designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is a web application security scanner built on python2.7, designed to find various default and insecure files, configurations and misconfigurations. It’s developed and mantained by Momo Outaadi(m4ll0k), that… read more »
  • Aug 23, 2017

    Guitar tips: my own daily warm-up exercises

    Every morning a guitarist wakes up … and doing the warm-up! The warm-up is a very important step of a musician’s daily routine: a simple set of progressive exercises useful to predispose muscles and articulation for more complex movements and stretching. Today… read more »
  • Aug 21, 2017

    Volatility, my own cheatsheet (Part 8): Filesystem

    With this part, we ended the series dedicated to Volatility: the last ‘episode’ is focused on file system. If you want to read the other parts, take a look to this index: Image Identification Processes and DLLs Process Memory Kernel Memory… read more »
  • Aug 9, 2017

    Windows Command Line cheatsheet (part 2): WMIC

    This command-line tool is really useful for both penetration testing and forensics tasks The previous article has raised interest in readers regarding WMIC.So I decided to write an article dedicated to this tool. If you’ve done any scripting for the… read more »
  • Aug 7, 2017

    Volatility, my own cheatsheet (Part 7): Analyze and convert crash dumps and hibernation files

    Volatility supports memory dumps in several different formats, to ensure the highest compatibility with different acquisition tools. You can analyze hibernation files, crash dumps, virtualbox core dumps, etc in the same way as any raw memory dump and Volatility will… read more »
  • Aug 4, 2017

    How frustration can make us more creative

    An inspiring TED talk by Tim Harford, about how challenges and problems can make you more creative than ever. Starting talking about a Keith Jarrett’s concert, Tim Harford try to convince you of the advantages of having to work with a… read more »
  • Aug 3, 2017

    Windows Command Line cheatsheet (part 1): some useful tips

    Yes, also Windows can be used by command line… Today I propose a brief list of useful Windows CLI commands for daily use Windows Registry Adding Keys and Values C:>reg add [\TargetIPaddr][RegDomain][Key] Add a key to the registry on machine [TargetIPaddr] within… read more »
  • Aug 2, 2017

    Boost your console productivity on tmux

    With “ Oh My Tmux!”, a self-contained, pretty and versatile tmux configuration file tmux is a tool that can be used to multiplex several virtual consoles, allowing a user to access multiple separate terminal sessions inside a single terminal window… read more »
  • Aug 1, 2017

    “This is what the future will look like “

    A really inspiring post written by Udo Gollub Yesterday, on my Facebook stream, i’ve seen this post: [embed]https://www.facebook.com/alessandro.mininno/posts/1388047444576236[/embed] It’s the italian translation of a post made by Udo Gollub, on his profile. I think that is a really interesting reading, and… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician