• Volatility, my own cheatsheet (Part 3): Process Memory

    Let’s try to analyze the memory in more detail… If we try to analyze the memory more thoroughly, without focusing only on the processes, we can find other interesting information. memmap The memmap command shows you exactly which pages are memory… read more »
  • The secret reason we eat meat

    Why do humans eat meat? Dr. Melanie Joy believes humans eat meat due to the long-engrained ideology of carnism: “Carnism is a dominant ideology, which means it’s embedded deeply in society to the point that it’s considered ‘just the way things are,’”… read more »
  • Malware persistence techniques

    Once executed on target system, a malware try to hide itself and achieving persistence on the exploited machine, in order to continue to act even after system reboot. Today let’s try to focus on Windows systems, which have a lot… read more »
  • Andres Segovia concert on Italian television

    A valuable historical document In the 1960s, the Italian TV broadcaster RAI broadcast a fascinating concert by Andres Segovia.I’ve found a copy on Youtube, the sound is slightly distorted, but the program very respectable: 1:27 — “Da un Codice Lautenbuch”, Six lute… read more »
  • Fileless Malware for Dummies

    Just some random thoughts about this kind of threat Some days ago, a non-technical friend asked me some informations about ‘fileless malware’. Has been pretty difficult to explain this concept to a person lacking a correct security knowledge, so i have… read more »
  • Volatility, my own cheatsheet (Part 2): Processes and DLLs

    Once identified the correct profile, we can start to analyze the processes in the memory and, when the dump come from a windows system, the loaded DLLs. pslist To list the processes of a system, use the pslist command. This walks the… read more »
  • Information gathering tools

    Using OSINT sources for penetration testing In early stages of a penetration test is a best practice the gathering of the most detailed information about the target, also using public data and search engines. Below there is my short list… read more »
  • Python for malware analysis

    Six Python tools useful for identify and analyse malware Python is a very used scripting language in the field of computer forensics and malware analysis. Today, we look at some of the tools developed in this scripting language that are useful… read more »
  • Petya/Notpetya ransomware: we have a vaccine!

    Just create a file in c:\windows! Currently we have a lot of information about Petya (ot Notpetya): you can take a look at this post, that i use to collect all information gathered from websites and social networks. And from… read more »
  • Extract filesystem bodyfile from a VirtualBox VM

    Using vboxmanage and some tools from SleuthKit A key step in a forensic analysis is the creation of a timeline of the filesystem operations.The operation can be performed using (for example) the fls tool from Sleuthkit, that exports the timeline… read more »
  • A Petya Ransomware variant that uses the eternalblue exploit starts from Ukraine and spreading…

    What we know so far? UPDATE: We have a local vaccine New ransomware start spreading in Ukraine and shutdown a lot of critical infrastructures (hospitals, airport, banks and power plants). Some report coming also from Italy, Germany and Spain. Early comments on… read more »
  • How to modify laptop’s screen brightness from a bash script

    Using a direct access to /sys/class/backlight My Debian laptop is configured with a very minimal setup, using i3 as window manager and without any graphical tool for system management. To manage the screen brightness i choosed not using a specific… read more »
  • Volatility, my own cheatsheet (Part 1): Image Identification

    In order to start a memory analysis with Volatility, the identification of the type of memory image is a mandatory step. Here some usefull commands. imageinfo For a high level summary of the memory sample you’re analyzing, use the imageinfo… read more »
  • How to extract a RAM dump from a running VirtualBox machine

    In order to analyze it with Volatility Usually i use a VirtualBox sandbox in order to ‘detonate’ some malware and analyze the behavior of them. In this phase, the analysis of sandbox’s ram with Volatility is a mandatory step.But, how… read more »
  • Security flaws in VoLTE protocol allow an attacker to spoof numbers and track users

    The research paper by P1 Security was presented last week in a security conference in France A team of researchers from security firm P1 Security has detailed a list of flaws in the VoLTE protocol that allows an attacker to spoof… read more »
  • Detecting Lateral Movement through tracking Windows Events

    A research by Japan Computer Emergency Response Team   With “lateral movement’ we identify the techniques that enable an adversary to access and control remote systems on a network: an attacker can use lateral movement for many purposes, including remote execution… read more »
  • Hackers: the Internet’s immune system

    Great speech by Keren Elazari from TED.com Keren Elazari is an internationally recognized researcher, author and speaker on all matters cyber security and hacker culture. Since 2000, Keren has worked with leading security firms, public organizations, Big 4 and Fortune 500… read more »
  • How to upgrade from Debian 8 “Jessie” to Debian 9 “Stretch”

    Simple, with 5 commands! Finally, Debian 9 “Stretch” was released in the “stable” branch! A lot of upgrades, especially in kernel, glibc and other base packages. Some info from the official wiki (also see the official stretch release notes.): New… read more »
  • Kansa: a powershell incident response framework

    Automated acquisition of data from thousands of hosts with Powershell! Kansa is a powershell framework designed by Dave Hull to support massive data collections. It permits to easily scaling to thousands of systems via powershell remoting, but is not confined… read more »
  • Standard Windows processes: a brief reference

    Useful in forensics analysis and incident response During the analysis phase, after (for example) a system compromization, is very important to know the standard Windows processes, in order to have a ‘baseline’ useful to make a ‘diff’ with the compromised system.… read more »