Andrea Fortuna
AboutRss
  • Jan 25, 2017

    Hijacking Whatsapp accounts using Whatsapp Web?

    It seems possible: let’s analyze a recently published research Really interesting article by Martin Wagner about a technique that allows account hijacking on Whatsapp using the web interface of this messaging service. Whatsapp accounts are based on phone numbers. This… read more »
  • Jan 24, 2017

    Musician’s stuff: 6 good suggestions for a more creative 2017

    “Invest in yourself and try new things this year!” This article from Dan Musselman is very inspiring for me. 6 useful tips to be a more creative musician, 6 good propositions for 2017: As a musician, few things are more important… read more »
  • Jan 23, 2017

    Free DDoS mitigation services for independent media, organizations and activists

    Free protection for freedom of speech Recently, DDoS attacks have become also a tool to silence independent journalists, small media and activist websites: also an attacker without much experience is now able to launch an attack that can take many small… read more »
  • Jan 20, 2017

    EyePyramid, the ultimate analysis

    “Uncovering the Inner Workings of EyePyramid”, from TrendMicro (…and a small gift for Italian readers) About EyePyramid I have already wrote something, bringing mainly analyzes conducted by researchers much more prepared than me. :-) But now I need to talk again about… read more »
  • Jan 19, 2017

    The programmer’s dilemma: write good code or stay fat?

    “I need sugar to write good code!” Funny strip from Commitstrip: how many calories do you need a day to write good code? from http://www.commitstrip.com/en/2017/01/17/how-many-calories-do-you-need-a-day-to-write-good-code/ … read more »
  • Jan 18, 2017

    RecuperaBit, a tool for Forensic File System Reconstruction

    A python script that reconstruct filesystem structures and recover files on NTFS filesystems RecuperaBit is a python script developed by Andrea Lazzarotto useful for attempting to reconstruct a corrupted NTFS filesystem. RecuperaBit attempts reconstruction of the directory structure regardless of:… read more »
  • Jan 17, 2017

    ZeroPhone, the Raspberry smartphone

    A completely open-source mobile phone that you can assemble for 50$ You care about your privacy? You do not trust the manufacturers of smartphones and the backdoors that can be inserted into the firmware? You fear being intercepted? With just $50… read more »
  • Jan 16, 2017

    WhatsApp has a “Backdoor”? What’s the fact?

    The issue has nothing to do with the security of Signal encryption protocol, that continues to be one of the most secure encryption protocols. Recently an article published in April 2016 by security researcher Tobias Boelter has gained public attention:… read more »
  • Jan 13, 2017

    Should I suggest to my friends to stop using all messaging apps, except Signal?

    In simple words: yes, if you care about privacy About the privacy implications related to the various instant messaging clients I have already wrote a few months ago in a rather terse. But this article by Romain Aubert instead treats the… read more »
  • Jan 12, 2017

    How to secure MongoDB instances to avoid ransom attacks

    “MongoDB apocalypse is here as Ransom Attacks” Recently, some attackers have performed a lot malicious attacks on unsecured instances of MongoDB running openly on the internet. The attacker erased the database and demanded a ransom be paid before restoring it. Cyberciti has… read more »
  • Jan 11, 2017

    What we know about EyePyramid?

    A useful recap by Federico Maggi The security researcher Federico Maggi has made a useful recap of all technical information currently available about EyePyramid, the malware used in the cyber-espionage campaign that involved some relevant Italian politicians. What happened? Sensitive information… read more »
  • Jan 2, 2017

    How to sync your GoogleDrive storage on Linux with Rclone

    And some tips to integrate it on XFCE4 Google Drive is definitely a great cloud storage service. However, it suffers from significant limitations, including the lack of an official sync client for Linux. Fortunately there are many tools that allow you… read more »
  • Dec 31, 2016

    Crash iOS Message application with a VFC file

    “Don’t try this if you don’t know what you do” A recently discovered bug can completely block the Messages app on any iPhone and iPad updated to iOS 8, iOS iOS 9 or 10. Just send a well crafted vcf file to… read more »
  • Dec 30, 2016

    A PHPMailer vulnerability leaves millions of websites vulnerable to remote exploit

    A critical vulnerability, tracked as CVE-2016–10033, affects all versions of PHPMailer before 5.2.18 Dawid Golunski, security expert from Legal Hackers, has discovered a flaw in PHPMailer that could be exploited by a remote attacker to execute arbitrary code in the context… read more »
  • Dec 28, 2016

    Running goal for 2016? Reached!

    5000 fun kilometers! A big ‘thank you’ to who tolerates this my insane passion, to those who see me back into the house in rainy days soaked and dripping, to those who has now got used to wake up the… read more »
  • Dec 23, 2016

    How to dump volatile memory on Windows systems?

    My own shortlist One of the first steps that you need to perform when you deal with the forensic analysis of a compromised machine is to make a copy of volatile memory. This copy will be used for in-depth analysis… read more »
  • Dec 22, 2016

    Detect and bypass Web Application Firewalls using Python

    “If you are hired as a penetration tester for some company and they forgot to tell you that they are using web application firewall than you might get into a serious mess.” Interesting article published by Usman Nasir on KaliTutorials: using… read more »
  • Dec 21, 2016

    The right hand thumb in classical guitar: correct position and exercises

    An interesting video lesson by Bradford Werner In this video, Bradford Werner talks about the right hand thumb position and the related exercises. [embed]https://www.youtube.com/watch?v=BpU1zYKp404[/embed] When adjusting your hand and thumb position remember to also consider your guitar position, footstool height, and… read more »
  • Dec 20, 2016

    PowerShellArsenal , a PowerShell module for reverse engineering

    Powerful and easy to use PowerShellArsenal is a useful PowerShell module that can be used to perform reverse engineering activities on .NET assemblies, like disassembling code, perform .NET malware analysis and analyze memory. PowerShellArsenal is comprised of the following tools: Disassembly — Disassemble native and… read more »
  • Dec 19, 2016

    Malvertisement attack to home routers

    DNSChanger is back! DNSChanger is a malware that infected millions of computers across the world in 2012 and that works by changing DNS server entries in infected computers to point to malicious servers under the control of the attackers, rather than… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician