• “Bond007.01”, a new botnet used for cryptocurrency mining and DDoS attacks

    Infects servers and earning around a thousand dollars a day This new botnet coming out of China and was discovered by researchers at GuardiCore Labs. The infected systems (up to 15,000 Windows servers) make up a wide variety of government, corporate,… read more »
  • The worst Windows RCE exploit of all time is coming?

    Google Project Zero’s researchers have discovered another critical remote code execution vulnerability in Microsoft’s Windows, and it seems something truly bad! UPDATE Microsoft immediately releases a fix, and ProjectZero releases vulnerability details: [embed]https://www.andreafortuna.org/the-crazy-bad-vulnerability-has-been-fixed-by-microsoft-in-a-very-short-time-9dd54c0d0ece[/embed] During the weekend, the Project Zero’s researchers Tavis… read more »
  • Composing music using the Higgs boson LHC data

    I discover it out late enough, but the project is fantastic! On Wednesday 4th July 2012, scientists at CERN announced that they had found a Higgs-like particle after analysing results from the Large Hadron Collider. After the announce, Domenico Vicinanza… read more »
  • Digital forensics on automotive infotainment systems

    It contains tons of historical data that can be useful in a after-crash analysis The current generation of automotive infotainment and telematics systems is very powerful, and offers a large set of features, like: Digital radio Satellite (GPS) navigation Bluetooth… read more »
  • Intel patches a remote code execution bug hidden in its chips since 2008

    For the past seven years, millions of Intel PCs have been potentially vulnerable Intel have announced that there is a privilege escalation vulnerability in their Active Management Technology (AMT), Standard Manageability (ISM) and Small Business Technology (SBT) products. These products provide… read more »
  • Build your own Windows worm in minutes

    Really simple-to-use tools, available to everyone! In this brief video (3' 14'’), from O’Reilly website, Chad Russell constructs a simple computer worm using one of the well known tools for malware building, “Internet Worm Maker Thing”. [embed]https://vimeo.com/215655847[/embed] Internet Worm Maker… read more »
  • How to create a strong password?

    How secure are your passwords? On WhoIsHostingThis? i found a useful infographic that explains how to create a strong password: So what constitutes the “perfect” password? If you’re serious about security, a strong password will include a mix of upper… read more »
  • Linux kernel explained, with a comic

    “What is it, and how does it work?” A funny explanation of linux kernel, made with a comic by Consolia. https://consolia-comic.com/comics/kernel I think more developers should know how the linux kernel works. Regarding it as a black box only gets you… read more »
  • The Internet is still broken

    BGP Hijacking is an actual problem that we need to solve Yesterday i have read a brief but interesting article about BGP Hijacking written by Johannes B. Ullrich, published on SANS ISC InfoSec Forum. About BGP Hijacking i have already written… read more »
  • Two open source tools to easily generate YARA rules

    If you need to generate your own rules starting from recovered evidences YARA is a tool aimed at helping malware researchers to identify and classify malware samples. Basically, write some antivirus signatures (or essentially regular expressions) and it can search… read more »
  • How to spot a fake guitar in seconds

    Keep your eyes (and ears) open! Is it really possible to buy a non-original guitar? Yes! Furthermore it can happens in unexpected places like a used instruments store, as shown by these two videos made by Kennis Russell: [embed]https://www.youtube.com/watch?v=q-W3b3d4sz0[/embed] [embed]https://www.youtube.com/watch?v=t4QdOJ1B_kI[/embed] In… read more »
  • Automated memory capture and analysis on Linux with Linux Memory Grabber

    A script for dumping Linux memory and creating Volatility profiles I have already written something about dump of volatile memory on Linux systems.Recently i have discovered this useful script developed by Hal Pomeranz, that automate all steps required to perform… read more »
  • ENISA training resources for cybersecurity incidend response

    A really useful free training course ENISA (European Union Agency for Network and Information Security) is a centre of expertise for cyber security in Europe, with main mission of contribute to securing Europe’s information society by raising “awareness of network and… read more »
  • Four tools for File Carving in forensic analysis

    Useful to extract files from inside disk and memory images   File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. This is done by analyzing the raw data and identifying what it is… read more »
  • 0-Day vulnerabilities in Apache Struts: a plague for companies?

    In the last months, Apache Struts was afflicted by some serious 0-Day vulnerabilities, that allows remote code execution on unpatched hosts Every security expert trembles with fear when he reads “RCE” (Remote Code Execution) on a disclosure document, and read… read more »
  • Phishing with Unicode Domains, an attack almost impossible to detect

    The vulnerability affects Chrome, Firefox and Opera The security researcher Xudong Zheng has discovered a new technique for phishing attacks: using an homograph attack, Zheng discovers that is possible to display a fake domain names as the websites of legitimate services,… read more »
  • One-Line Perl Portscanner

    Just for fun! Do you need a simple portscanner? Make it with a single line of Perl! [embed]https://gist.github.com/andreafortuna/ab386f11d12d5305c069193f6680b25a[/embed] Thats it! :-) … read more »
  • ShadowBrokers releases some 0-Day Remote Code Execution exploits on Microsoft Windows…

    …turn off your Windows computers for the weekend and go enjoy the nice weather! UPDATE: Microsoft response that exploits were patched in the last month update: Most of the exploits that were disclosed fall into vulnerabilities that are already patched in… read more »
  • How to use Nmap for vulnerability assessment

    Using the “Nmap Scripting Engine”   I don’t think I need to explain what is Nmap: probably the most famous and used portscanner in the known universe. Nmap has a lot of feature, and one of them is a built-in… read more »
  • CVE-2017–0199: the MS Office 0-day is already used to spread malware

    However, Microsoft has pached the vulnerability, so…update! On unpatched systems, the vulnerability is triggered by opening a document that opens a download warning, followed by a download from a malicious server that sends a dangerous document: The document is a… read more »