Andrea Fortuna
AboutRss
  • Jul 19, 2017

    XRay: a great network OSINT gathering tool

    Really useful in the first phases of a penetration test XRay is a tool for network OSINT gathering developed by Simone Margaritelli, useful to make initial tasks of information gathering and network mapping. It make a bruteforce of subdomains using… read more »
  • Jul 18, 2017

    How to extract data and timeline from Master File Table on NTFS filesystem

    The most important file in a NTFS filesystem During a forensics analysis, after evidence acquisition, the investigation starts by doing a timeline analysis, that extract from the images all information on when files were modified, accessed, changed and created. Different… read more »
  • Jul 17, 2017

    Volatility, my own cheatsheet (Part 4): Kernel Memory and Objects

    Let’s go down a bit more deeply in the system, and let’s go to find kernel modules into the memory dump. modules To view the list of kernel drivers loaded on the system, use the modules command. This walks the… read more »
  • Jul 16, 2017

    “Light of the Seven” from Game Of Thrones soundtrack: my guitar transcription

    A simple piece, good for novice students Tonight is the night! The sixth season of Game Of Thrones ends with a big explosion and a beautiful music theme written by Ramin Djawadi. Often to my guitar students I propose small studies… read more »
  • Jul 14, 2017

    Ultra-Geek Linux Laptop: my own setup

    Some days ago i’ve written a post about the “Ultra-Geek” Linux Workstation developed by Joe Nelson. Reading his post, I found many similarities with the current configuration of my laptop. So I decided to share the setup of my ‘Ultra-Geek… read more »
  • Jul 13, 2017

    jq: a lightweight and flexible command-line JSON processor

    Like ‘sed’, for JSON data jq is like sed for JSON data - you can use it to slice and filter and map and transform structured data with the same ease that sed, awk, grep and friends let you play with… read more »
  • Jul 12, 2017

    Hindsight: Internet history forensics for Google Chrome/Chromium

    An Open Source tool for analyzing web artifacts. Hindsight is a open source tool for parsing a user’s Chrome browser data. Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill… read more »
  • Jul 11, 2017

    Bitscout — The Free Remote Digital Forensics Tool Builder

    Kaspersky Releases an Open Source Digital Forensics Tool Bitscout initially started as a hobby project a few years ago (version 1.0 was never released to the public), and it has been continually improved based on the requirements that arose in… read more »
  • Jul 10, 2017

    Volatility, my own cheatsheet (Part 3): Process Memory

    Let’s try to analyze the memory in more detail… If we try to analyze the memory more thoroughly, without focusing only on the processes, we can find other interesting information. memmap The memmap command shows you exactly which pages are memory… read more »
  • Jul 7, 2017

    The secret reason we eat meat

    Why do humans eat meat? Dr. Melanie Joy believes humans eat meat due to the long-engrained ideology of carnism: “Carnism is a dominant ideology, which means it’s embedded deeply in society to the point that it’s considered ‘just the way things are,’”… read more »
  • Jul 6, 2017

    Malware persistence techniques

    Once executed on target system, a malware try to hide itself and achieving persistence on the exploited machine, in order to continue to act even after system reboot. Today let’s try to focus on Windows systems, which have a lot… read more »
  • Jul 5, 2017

    Andres Segovia concert on Italian television

    A valuable historical document In the 1960s, the Italian TV broadcaster RAI broadcast a fascinating concert by Andres Segovia.I’ve found a copy on Youtube, the sound is slightly distorted, but the program very respectable: 1:27 — “Da un Codice Lautenbuch”, Six lute… read more »
  • Jul 4, 2017

    Fileless Malware for Dummies

    Just some random thoughts about this kind of threat Some days ago, a non-technical friend asked me some informations about ‘fileless malware’. Has been pretty difficult to explain this concept to a person lacking a correct security knowledge, so i have… read more »
  • Jul 3, 2017

    Volatility, my own cheatsheet (Part 2): Processes and DLLs

    Once identified the correct profile, we can start to analyze the processes in the memory and, when the dump come from a windows system, the loaded DLLs. pslist To list the processes of a system, use the pslist command. This walks the… read more »
  • Jun 30, 2017

    Information gathering tools

    Using OSINT sources for penetration testing In early stages of a penetration test is a best practice the gathering of the most detailed information about the target, also using public data and search engines. Below there is my short list… read more »
  • Jun 29, 2017

    Python for malware analysis

    Six Python tools useful for identify and analyse malware Python is a very used scripting language in the field of computer forensics and malware analysis. Today, we look at some of the tools developed in this scripting language that are useful… read more »
  • Jun 28, 2017

    Petya/Notpetya ransomware: we have a vaccine!

    Just create a file in c:\windows! Currently we have a lot of information about Petya (ot Notpetya): you can take a look at this post, that i use to collect all information gathered from websites and social networks. And from… read more »
  • Jun 28, 2017

    Extract filesystem bodyfile from a VirtualBox VM

    Using vboxmanage and some tools from SleuthKit A key step in a forensic analysis is the creation of a timeline of the filesystem operations.The operation can be performed using (for example) the fls tool from Sleuthkit, that exports the timeline… read more »
  • Jun 27, 2017

    A Petya Ransomware variant that uses the eternalblue exploit starts from Ukraine and spreading…

    What we know so far? UPDATE: We have a local vaccine New ransomware start spreading in Ukraine and shutdown a lot of critical infrastructures (hospitals, airport, banks and power plants). Some report coming also from Italy, Germany and Spain. Early comments on… read more »
  • Jun 27, 2017

    How to modify laptop’s screen brightness from a bash script

    Using a direct access to /sys/class/backlight My Debian laptop is configured with a very minimal setup, using i3 as window manager and without any graphical tool for system management. To manage the screen brightness i choosed not using a specific… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician