-
Aug 31, 2017
And not all of the predictions are completely off-base: some computer-generated theories that have been talked about by fans of the show. Readers of the “A Song of Ice and Fire” novel series on which the TV show is based… read more »
-
Aug 31, 2017
Useful during a pentest Raven is a tool developed by 0x09AL to gather information about an organization employees using Linkedin. It’s developed using python, Selenium e geckodriver Features Automatically check found emails in haveibeenpwned.com Output in CSV format Installation Simply run… read more »
-
Aug 30, 2017
Like sqlmap, but for non-relational databases! NoSQLMap is a tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases as well as web applications using NoSQL in order to disclose data… read more »
-
Aug 29, 2017
“A musical escape into a world of light and color” Today I want to share two videos from TED.com featuring Kaki King (born Katherine Elizabeth King), a guitarist and composer known for her percussive technique applied on multiple tunings on acoustic… read more »
-
Aug 28, 2017
A shortlist of six distribution…guess my favorite! During a digital forensics analysis, a lot of different tools can be used, and it could be useful use a dedicated linux distribution with all tools already installed and configured. Here a brief… read more »
-
Aug 25, 2017
Designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is a web application security scanner built on python2.7, designed to find various default and insecure files, configurations and misconfigurations. It’s developed and mantained by Momo Outaadi(m4ll0k), that… read more »
-
Aug 23, 2017
Every morning a guitarist wakes up … and doing the warm-up! The warm-up is a very important step of a musician’s daily routine: a simple set of progressive exercises useful to predispose muscles and articulation for more complex movements and stretching. Today… read more »
-
Aug 21, 2017
With this part, we ended the series dedicated to Volatility: the last ‘episode’ is focused on file system. If you want to read the other parts, take a look to this index: Image Identification Processes and DLLs Process Memory Kernel Memory… read more »
-
Aug 9, 2017
This command-line tool is really useful for both penetration testing and forensics tasks The previous article has raised interest in readers regarding WMIC.So I decided to write an article dedicated to this tool. If you’ve done any scripting for the… read more »
-
Aug 7, 2017
Volatility supports memory dumps in several different formats, to ensure the highest compatibility with different acquisition tools. You can analyze hibernation files, crash dumps, virtualbox core dumps, etc in the same way as any raw memory dump and Volatility will… read more »
-
Aug 4, 2017
An inspiring TED talk by Tim Harford, about how challenges and problems can make you more creative than ever. Starting talking about a Keith Jarrett’s concert, Tim Harford try to convince you of the advantages of having to work with a… read more »
-
Aug 3, 2017
Yes, also Windows can be used by command line… Today I propose a brief list of useful Windows CLI commands for daily use Windows Registry Adding Keys and Values C:>reg add [\TargetIPaddr][RegDomain][Key] Add a key to the registry on machine [TargetIPaddr] within… read more »
-
Aug 2, 2017
With “ Oh My Tmux!”, a self-contained, pretty and versatile tmux configuration file tmux is a tool that can be used to multiplex several virtual consoles, allowing a user to access multiple separate terminal sessions inside a single terminal window… read more »
-
Aug 1, 2017
A really inspiring post written by Udo Gollub Yesterday, on my Facebook stream, i’ve seen this post: [embed]https://www.facebook.com/alessandro.mininno/posts/1388047444576236[/embed] It’s the italian translation of a post made by Udo Gollub, on his profile. I think that is a really interesting reading, and… read more »
-
Jul 31, 2017
Volatility has the ability to carve the Windows registry data. (Other articles about Volatility: https://www.andreafortuna.org/category/volatility) hivescan To find the physical addresses of CMHIVEs (registry hives) in memory, use the hivescan command. For more information: Enumerating Registry Hives The Windows registry can… read more »
-
Jul 27, 2017
A fully configured platform with open source tools FLARE VM is a freely available and open sourced Windows-based security distribution for reverse engineering, malware analysis, incident response, forensics analysis, and penetration tests. FLARE VM delivers a fully configured platform with a… read more »
-
Jul 25, 2017
A fast and thorough forensic tool bulk_extractor is a computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system structure. Using this approach, bulk_extractor is more fast… read more »
-
Jul 24, 2017
This time we try to analyze the network connections, valuable material during the analysis phase. connections To view TCP connections that were active at the time of the memory acquisition, use the connections command. This walks the singly-linked list of… read more »
-
Jul 21, 2017
Can i manage my home-server using Telegram? batbot.sh is a bash Telegram Bot developed by Andrea Menin. It can reply to user messages, execute commands, and others cool features. [embed]https://www.youtube.com/watch?v=CZbD49nzWSE[/embed] Usage ./botbat.sh [-t "<token>"] [-c <seconds>] ./botbat.sh -h -t Set… read more »
-
Jul 20, 2017
Using Volatility and EVTXtract Usually i use a different approach based on Windows version: Windows XP and 2003 machines Simply use the evtlogs plugin of Volatility: The evtlogs command extracts and parses binary event logs from memory. Binary event logs are… read more »