Andrea Fortuna
AboutRss
  • Feb 17, 2017

    A DIY project for the weekend: build a Lap Steel Guitar

    A project by Shane Speal, the “king of the Cigar Box Guitar” Do you have a free weekend and do you want to have fun with DIY? On this article on GuitarWorld, Shane Speal proposes a funny project for the construction… read more »
  • Feb 16, 2017

    Yahoo notifies users that hackers didn’t even need passwords to breach accounts

    Seriously, are you still using Yahoo email services? Yahoo is warning more of its users that their accounts might have still accessed by unauthorised parties. Yahoo believes that malicious users, using the proprietary code stolen in the recent databreach, can… read more »
  • Feb 16, 2017

    Identify the different types of hashes with hashID

    A great python script! hashID is a tool written in Python 3 useful to identify the different types of hashes used to encrypt data and passwords. It supports the identification of over 220 unique hash types using regular expressions and it is… read more »
  • Feb 15, 2017

    Online PCAP analysis with PacketTotal

    Why using Wireshark? PacketTotal is an online engine for analyzing .pcap files and visualizing the network traffic within, useful for malware analysis and incident response. PacketTotal leverages features of BRO IDS and Suricata to flag malicious/suspicious traffic, display detailed protocol information,… read more »
  • Feb 14, 2017

    Reinstall a running Linux system via SSH without rebooting, with takeover.ssh

    It can sound like science fiction, but it is possible! (Running in RAM!) And you can do with this script developed by Héctor Martín Cantero: A script to completely take over a running Linux system remotely, allowing you to log into… read more »
  • Feb 13, 2017

    Learn to code in more than 30 languages, with repl.it

    A powerful online interactive environment for programming languages By pure chance i came across repl.it, a site that provides a free online IDE for testing more than 30 different programming languages with interesting features for teacher, like the ‘classrooms’: What… read more »
  • Feb 10, 2017

    How is made a phishing campaign

    The explanation in an interesting article by James Coote Dear security experts, paladins of incident response who spend your days fighting against phishing campaigns, have you ever wondered how it is made a phishing campaign? This very accurate article by James… read more »
  • Feb 9, 2017

    Ticketbleed, a TLS vulnerability on F5 appliances

    Similar to the well known Heartbleed vulnerability Ticketbleed is a vulnerability (CVE-2016–9244) in the TLS/SSL stack of F5 BIG-IP appliances allowing a remote attacker to extract up to 31 bytes of uninitialized memory at a time, that can potentially contain… read more »
  • Feb 9, 2017

    Analyze websites and the resources they request with urlscan.io

    Find out which HTTP requests your website triggers in the background and where they call out to This is not my discovery, but a very useful resource found through a Florian Roth tweet: [embed]https://twitter.com/cyb3rops/status/828581308792176646[/embed] urlscan.io is a service which analyses websites… read more »
  • Feb 8, 2017

    Emil Zátopek, 4 lessons about running and life

    If you are a runner that gives up at the first difficulty, here some advice from the “Czech Locomotive” 0. Who was Emil Zátopek? From Wikipedia: Emil Zátopek was a Czechoslovak long-distance runner best known for winning three gold medals at… read more »
  • Feb 7, 2017

    Simple malware downloader obfuscation with Powershell and Base64

    Maybe i have reinvented the wheel… …but i think is useful to share this discovery. I recently had the opportunity to analyze an email with attached a link that downloads a suspicious file. From a first analysis, it seemed be a .lnk… read more »
  • Feb 6, 2017

    Nope, 432 Hz is not the “frequency of universe”

    Let’s try to separate fact from fiction If you happen to meet some musician who claims that 432 Hz is “the natural frequency of the Universe”, which this frequency has the power of “attract the masses to the music” and cure… read more »
  • Feb 3, 2017

    A great malware removal guide from Heimdal Security

    A great collection of useful tools Paul Cucu has published on Heimdal Security Blog a really good article on malware removal, a useful guided checklist for removal malicious software from PCs: So how do you remove malware? Let’s not waste time… read more »
  • Feb 2, 2017

    Zero-day content injection vulnerability found in WordPress REST API

    Patch your CMS Now! Just a very quick post to warn you of a new vulnerability discovered by Sucuri on Wordpress. The vulnerability could be exploited by an unauthenticated attacker to inject malicious content, to modify posts, pages and any other… read more »
  • Feb 2, 2017

    The “GitLab meltdown”: moral of the story?

    Pretty simple: verify your backups! GitLab.com is in crisis after experiencing a severe data loss caused by human errors and ineffectual backups. What happened? On Tuesday evening, one database experience a severe performance degradation, and the sysadmin tries to start an… read more »
  • Feb 1, 2017

    A serious vulnerability found in 31 Netgear models allows bypassing authentication on admin panel

    …and lets hackers turn your router into a botnet! Trustwave has disclosed a flaw that affects Netgears routers. As the security researcher Simon Kenin explains, the vulnerability allows attackers to exploit the router’s password recovery system to bypass authentication and gain… read more »
  • Jan 31, 2017

    Warning! A simple SMS could break your Samsung Galaxy!

    The vulnerability was disclosed last week Vulnerability researchers of Context has discovered a flaw in Samsung’s Galaxy S4, S4 Mini, S5 and Note 4 smartphones that could be exploited by remote attackers to reboot targeted devices. The security hole, already patched… read more »
  • Jan 30, 2017

    Fernando Sor’s guitar technique: a good analysis by Rob MacKillop

    “Sor played without nails. He generally used only the thumb, index and middle fingers.” I think that the blog of Rob MacKillop is inspiring and very useful. His research on the guitar technique is very interesting, especially regarding the use… read more »
  • Jan 27, 2017

    WebEx plugin for Chrome: two serious vulnerabilities in a few days

    My advice? Check often for updates! On January, 21 the security researcher Tavis Ormandy from Google Project Zero has disclosed a vulnerability the Webex Chrome extension that allows remote execution of commands on any computer with the extension installed (about 20… read more »
  • Jan 26, 2017

    MalDuino, a malicious USB dongle based on Arduino

    Hack like Mr. Robot, with Arduino! MalDuino is an Arduino-powered USB device which emulates a keyboard and has keystroke injection capabilities. MalDuino is an arduino-powered USB device which has keyboard injection capabilities. Once plugged in, MalDuino acts as a keyboard, typing… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician