Andrea Fortuna
AboutRss
  • Apr 14, 2017

    How to use Nmap for vulnerability assessment

    Using the “Nmap Scripting Engine”   I don’t think I need to explain what is Nmap: probably the most famous and used portscanner in the known universe. Nmap has a lot of feature, and one of them is a built-in… read more »
  • Apr 12, 2017

    CVE-2017–0199: the MS Office 0-day is already used to spread malware

    However, Microsoft has pached the vulnerability, so…update! On unpatched systems, the vulnerability is triggered by opening a document that opens a download warning, followed by a download from a malicious server that sends a dangerous document: The document is a… read more »
  • Apr 11, 2017

    Your IoT device has a weak password? BrickedBot could destroy it!

    The attack might be trying to kill devices before they can join a botnet The security firm Radware has isolated, on their honeypots, two variants of a new bot attack targeting Internet of Things devices. Named BrickerBot, the bot gains access… read more »
  • Apr 10, 2017

    Automated penetration tests with APT2

    Penetration tests on a very big network? APT2 can help you! A penetration test usually begins with a perimetral scan (es. using NMAP), after continues with a testing for services (and their default passwords).Finally performs testing of known exploits and if… read more »
  • Apr 7, 2017

    PowerMemory: extract credentials from Windows memory

    Also in user-land Like Mimikittens, PowerMemory uses PowerShell to access Windows memory in user-land and extracts the credentials stored in ram: The method is totally new. It proves that it can be extremely easy to get credentials or any other… read more »
  • Apr 6, 2017

    Smartphones using Broadcom Wi-Fi SOC can be hacked Over-the-Air

    Security patch available only for Nexus & iOS A stack buffer overflow issue that affects all devices using Broadcom’s Wi-Fi stack was discovered by Google’s Project Zero researcher Gal Beniamini. The flaw affects Apple devices and also all android devices using… read more »
  • Apr 5, 2017

    How to open very large text files on Windows

    Some graphical tools and two command line tips I’ve had to search the occurrency of a string within some very large text files, as result of a “file carving” made with Autopsy. Usually on Windows I use Notepad ++, that provides… read more »
  • Apr 3, 2017

    OSINT Tools for Fact Checking

    My own list Another (brief) list of OSINT sources, this time focused on fact checking services. Fact-Check Investigate (an issue) in order to verify the facts. ‘I didn’t fact-check the assertions in the editorial’ ‘reporters can’t be expected to fact-check every quotation’… read more »
  • Mar 30, 2017

    Are you telling me that you still have an internet-exposed IIS6?

    You are insane! TrendMicro on its blog has published an article about a new 0-Day vulnerability that affects the WebDAV component of Microsoft Internet Information Services 6.0. The vulnerability ( CVE-2017–7269) is a bufferoverflow located into the webdav components of IIS:… read more »
  • Mar 29, 2017

    A javascript ransomware that exploits Safari bug targets porn-addicted iOS users

    But the remediation is really simple! Andrew Blaich, Jeremy Richards and Kristy Edwards, security researchers at Lookout, have published a research that expose a new technique used by ransomware scammers to spread malware on iOs devices. The attackers have been exploiting… read more »
  • Mar 28, 2017

    Kaspersky’s research reveals how much costs a DDoS attack service

    Kaspersky Lab published an analysis on the cost of a DDoS attack and services available in the black markets Kaspersky Lab has published an analysis on the cost of DDoS attacks that  estimated that a managed attack service typically goes for $25… read more »
  • Mar 27, 2017

    “I’ve Been Hacked! What can i do right now?”

    How many times have you heard this question? Often friends and colleagues ask me “my computer was hacked/infected, what can i do right now?” There are different type of response, often based on the other party’s technical knowledge. However, broadly… read more »
  • Mar 24, 2017

    Emanuele Segre: a really interesting documentary

    A very talented italian guitarist Today I want to offer a documentary dedicated to Emanuele Segre, one of my favorite performers.The documentary is produced by SKY TV Classica, I found it on youtube divided into three parts. For non italian… read more »
  • Mar 23, 2017

    DoubleAgent: an ‘unpatchable’ Windows feature could allow code injection in all processes

    Yep, even in antivirus! Security researchers from Cybellum, an Israeli security firm, has discovered a vulnerability that could allow code injection code technique works on all versions of Microsoft Windows operating systems, starting from Windows XP to the latest release… read more »
  • Mar 22, 2017

    Seriously? A backdoor that uses Telegram as C&C server?

    Yep, it’s called BrainDamage BrainDamage is a fully featured python based backdoor that uses Telegram as C&C server. It is a hypothetical evolution of backdoor (very unlikely, from my point of view), so it’s a good idea to analyze its… read more »
  • Mar 21, 2017

    Hijack a privileged Windows user session without password: critical 0-Day or dumb feature?

    Using just Task manager and the command line! The security researcher Alexander Korznikov has recently published an article that explain how a local privileged user can hijack the session of any logged-in Windows user who has higher privileges without knowing that… read more »
  • Mar 20, 2017

    Are you still using telnet on Cisco devices? I think you should disable it!

    The vulnerability is still unpatched Cisco has published an advisory concerning a vulnerability in its product, discovered while analyzing the “Vault 7” documentation published by Wikileaks last week. The vulnerability affects the Cluster Management Protocol in Cisco IOS and Cisco… read more »
  • Mar 20, 2017

    Open Source Intelligence tools for social media: my own list

    A constantly updated list of OSINT Sources   I continue the publication of my lists of OSINT sources, this time with a list focused on social networks public data. Twitter AllMyTweets View all tweets from any Twitter user on one page.… read more »
  • Mar 17, 2017

    Madame R. Sidney Pratten’s Guitar School

    One of the most important guitarists of the 19th century A very interesting article of Daniel Nistico on Classical Guitar N Stuff, that made me discover Sidney Pratten and her method book: “Guitar School”. Catharina Josepha Pratten (1821–1895) was one of… read more »
  • Mar 16, 2017

    My personal list of OSINT sources: search tools

    All the informations are online, you just need to know how to find them In a previous post, we discovered the real power of OSINT sources, now let’s start to see some helpful links from my personal list. Today the focus… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician