Andrea Fortuna
AboutRss
  • Sep 9, 2016

    Steal credentials from locked machines? Yes, it’s possible with a customized USB dongle.

    And it works on Windows and OSX! The security researcher Rob Fuller has discovered a new attack method that can be used to steal credentials from a locked computer (but, with the user logged in) and works on both Windows and… read more »
  • Sep 8, 2016

    Open a VMWare Disk Image (VMDK) with Autopsy for forensics analisys

    Using qemu-img! About VMXRAY i have already spoken in a previous post. But if i need to open a Virtual Disk Image with a forensics tool like Autopsy? Just convert the VMDK file into a format that can be read… read more »
  • Sep 7, 2016

    The LiberoMail users database was breached

    Change your password as soon as possible! The italian email hosting “Libero Mail” has announced that has suffered an attack that resulted in the compromise of its user database: Ti informiamo che il sistema di sicurezza di Libero ha rilevato… read more »
  • Sep 7, 2016

    VMXRAY: explore VM disk images in your browser

    The power of HTML5! You need to extract a single file from a disk image of a Virtual Machine (VMWare, VirtualBox and other), or just navigate the disk without install and start a virtualization tool? Pretty simple, with VMXRAY: VMXRay is… read more »
  • Sep 6, 2016

    The amazing Origami Millennium Falcon!

    The only paper ship that can be made in less than 12 parsecs A funny infographic from DeAgostini Model Space: And here another version from Tadashi Mori: [embed]https://www.youtube.com/watch?v=XqRGl4O-WzA[/embed] Enjoy! :-) … read more »
  • Sep 5, 2016

    30 Nmap Command Examples from nixCraft

    Userful for Sys/Network Admins Great post from nixCraft about the famous security tool Nmap: The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out… read more »
  • Sep 2, 2016

    Short Linux Tips: using SSH with a Socks Proxy

    Short but useful! Need to connect to an ssh server through a socks4/5 proxy? (for example, to connect to a tor hidden server?) Simple, with this short bash snippet: ssh -o ProxyCommand=’nc -x 127.0.0.1:9150 %h %p’ user@host … read more »
  • Sep 1, 2016

    Who is the best Batman’s antagonist, Jared Leto or Heath Ledger?

    Casey Chan on Gizmodo has made a good analysis Have you seen Suicide Squad? Do you like Jared Leto’s Joker or your preferred villain still remains Heath Ledger? Casey Chan on Gizmodo has written a good article about this two iconic… read more »
  • Aug 31, 2016

    Windows 10: a deep dive on privacy issues by EFF

    And some interesting comments from Bruce Schneier’s blog Bruce Schneier, on his blog, has linked an interesting article from eff.org about privacy implications of Windows 10: The trouble with Windows 10 doesn’t end with forcing users to download the operating… read more »
  • Aug 30, 2016

    Useful tips about improvisation on classical guitar

    Ten tips from three great guitarists Classical Guitar has published a really useful article about improvisation, with 10 tips from three great guitar players: Andrew York, Roland Dyens, and Dušan Bogdanovic. Classical guitar students may encounter a lack of standard… read more »
  • Aug 29, 2016

    The demo of graphic adventure game inspired by “Stranger Things” is available!

    Only a few days ago, the creators of the series have suggested that “Stranger Things” could become a video game. No sooner said than done. Speaking with IGN, Matt and Ross Duffer revealed that the timeline of next season of “Stranger… read more »
  • Aug 26, 2016

    A persistent and sophisticated malware targets all unpatched iOS devices

    Upgrade your device to iOS 9.3.5, ASAP! Citizen Lab and Lookout have discovered an active threat using three critical iOS zero-day vulnerabilities: when exploited, creates an attack chain that subverts even Apple’s strong security environment. The vulnerabilities CVE-2016–4655: Memory Corruption in… read more »
  • Aug 25, 2016

    Steganography Data Hiding and Watermarking with OpenStego

    Be brave, basically steganography is not hard! OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file. Watermarking: Sign files with an invisible signature. It can be used to detect unauthorized… read more »
  • Aug 24, 2016

    Small interesting *nix facts: the infamous fork bomb

    Maybe it’s a dated topic, but it’s always funny! What is a fork bomb? A fork bomb (also know as Rabbit Virus or Wabbit) is a denial-of-service attack wherein a process continually replicates itself, slowing down or crashing the system due to… read more »
  • Aug 23, 2016

    MacroShop , a collection of scripts for embedding malware payloads in Microsoft Office files

    A new youth for macro viruses? Recently, with a colleague were discussing how Office macros are becoming a vehicle widely used by malware distributors. On this Github repository i have found Macroshop, a collection of python script to aid the embedding… read more »
  • Aug 23, 2016

    Five complete solutions for email server deploy

    For inexperienced or impatient admins! Five complete solutions for rapidly deploy a complete mail server with a single installation. Enjoy! Citadel: Versatile and powerful mail server, written in C.License: GPLv3 iRedMail: Mail server solution based on Postfix and Dovecot.License: GPLv3… read more »
  • Aug 22, 2016

    BENIGNCERTAIN, the proof that the tools stolen to Equation Group are authentic

    And shows how the National Security Agency was able to decrypt VPN traffic! Some days ago, an hackers group named “The Shadow Brokers” has announced to have hacked a group linked to the NSA and dumped a lot of its hacking… read more »
  • Aug 19, 2016

    Tatyana Ryzhkova talks about fingernails length and shaping

    In this interesting video, the bielorussian guitar player Tatyana Ryzhkova talks about her fingernails shaping. [embed]https://www.youtube.com/watch?v=fDzFTBJRJnI[/embed] Tatyana uses a right hand posture rotated outwards, and this implies an asymmetric length of the fingernails, with the index fingernail visibly longer than… read more »
  • Aug 18, 2016

    How to Host a Tor Hidden Service on a spare Android device

    How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web! How make it? Three simple steps! 1 — Install Tor Install OrBot app from Google Play: [embed]https://play.google.com/store/apps/details?id=org.torproject.android[/embed] Then enable the ‘Hidden Service Hosting’ option… read more »
  • Aug 17, 2016

    Scan the Deep Web could be useful to discover 0-Day vulnerabilities?

    A group of researchers of Arizona State University think it could work! In the paper titled “Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence”, a group of 10 researchers ( Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra,… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician