Andrea Fortuna
AboutRss
  • Aug 8, 2016

    Simple SMB Scanner with a single line of shell

    Need a simple smb scanner to search windows shares on a network? Here a very simple script, made with nmap, smbclient and some shell commands. Usage Obviously, the scanner uses the same syntax used by nmap: ./smbscanner 192.168.0.* Dependencies Just nmap… read more »
  • Aug 8, 2016

    A website could track your smartphone location using the battery status data?

    “It could work!” Some months ago, researchers at Stanford University have published a paper about a new technique, named “PowerSpy”, that has capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over… read more »
  • Aug 5, 2016

    Do you like Shodan? You will love Censys!

    A new search engine, similar to Shodan.io but more hacker-friendly Censys is a search engine that was released in October by researchers from the University of Michigan as part of an open source project that aims at maintaining a “complete… read more »
  • Aug 5, 2016

    Malware analysis, my own list of tools and resources

    A constantly updated list — Last update: August 2, 2018 During my daily activities of analysis and research, often I discover new useful tools. I collected them in this list (periodically updated). Enjoy! Detection AnalyzePE — Wrapper for a variety of tools for reporting on… read more »
  • Aug 4, 2016

    Are you looking for the ideal smartwatch? Do it yourself!

    Make your own nerd smartwatch from an old Nokia 1100 Using an old Nokia 1100, connecting it to an Arduino brain, and setting up the software, you’ll have a bulky, awful, but totally DIY smartwatch that can connect to your phone… read more »
  • Aug 3, 2016

    Fun in the space, with a $50,000 camera, some water and…an Alka Seltzer

    Yes, science is also funny! What you see in the videos below is not exactly a scientific experiment.It’s more like a moment of relaxation, a fun time between the daily activities on International Space Station. The astronaut Terry Virts inserts an… read more »
  • Aug 2, 2016

    peace_of_mind is back again: now sells 200 Million Yahoo accounts!

    The price? Quite cheap: only 3 Bitcoins (US$1,824) After data leaks of Linkedin and VK, peace_of_mind is back: it put for sale on the marketplace The Real Deal 200 million Yahoo logins. Peace says in the description that the database… read more »
  • Aug 2, 2016

    Andrés Segovia — The Song Of The Guitar

    Old but gold! Several years ago, when I was a young guitar student in the hills around Rome, I met many difficulties to be able to find, in the only music store in the country, this videotape. Once received, i inserted… read more »
  • Aug 1, 2016

    Detect crypto ransomware in realtime with Cryptostalker

    Interesting project found on GitHub Cryptostalker and the original project randumb are the work of Sean Williams, who wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of… read more »
  • Jul 29, 2016

    LastPass hacked — can password managers be trusted?

    Just a few days ago Paolo Attivissimo has published this post in which he comments on an article by Sophos dedicated to password management apps: [embed]https://nakedsecurity.sophos.com/2016/07/19/why-you-should-use-a-password-manager/[/embed] Paolo concludes his post with this thought: Ultimo dubbio ricorrente: ci si può fidare… read more »
  • Jul 28, 2016

    Musician? Here some tips to remain motivated during daily practice!

    Stay motivated and avoid burnout! Useful article by Brent Vaartstra from LearnJazzStandards Blog: 4 things that can help you to stay motivated when you practice your instrument. Become goal oriented Setting goals and writing them down can be the difference between success… read more »
  • Jul 27, 2016

    Tech for Jihad: Dissecting Jihadists’ Digital Toolbox

    Flashpoint analysts reveal cyber tools used by islamic terrorists Jihadist groups use a variety of digital tools and online services that allow them to maintain a strong online presence, while also helping them remain undetected by adversaries. In a new… read more »
  • Jul 26, 2016

    Running for time or Running for distance, that is the question!

    It’s one of the biggest dilemma of every runner: is better run slow for a long distance or make a short workout focused on the speed? (Spoiler: for me neither of the two!) The human brain is able to manage the… read more »
  • Jul 22, 2016

    You can lose weight playing Pokémon Go?

    OmniCalculator.com has released a funny tool focused on the eggs you can receive at PokéStops, and how much weight you might lose when you hatching them. Start by entering your weight, decide which type of egg you want to hatch, and… read more »
  • Jul 21, 2016

    Your iPhone can be remotely compromised with a simple message

    Luckily, the vulnerability was already fixed by Apple Tyler Bohan, a security researcher from Cisco Talos, has discovered a critical bug in iOS, similar to Android Stagefright. [embed]http://blog.talosintel.com/2016/07/apple-image-rce.html[/embed] The vulnerability (CVE-2016–4631) resides in ImageIO, an API used to handle image data,… read more »
  • Jul 21, 2016

    How to prevent the huge CPU usage of gnome-keyring-daemon when starting Google Chrome

    Let’s try to mitigate an annoying behavior of Google Chrome on Linux If you using the (useful!) data synchronization feature of Google Chrome, you may encounter an unusual CPU usage from gnome-keyring-daemon process when the browser starts: the gnome-keyring-daemon eats all… read more »
  • Jul 20, 2016

    Automate IP and URL analysis with Automater

    Automater is a tool created to automate the OSINT analysis of IP addresses. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me,… read more »
  • Jul 19, 2016

    The Floppotron

    In 2011, Paweł Zadrożniak starts a strange research: making music with old floppy drives and other olds pc peripherals. The first attemps are very simple, first with one single drive: [embed]https://youtu.be/GTRqxfnnYUQ[/embed] then with two devices: [embed]https://youtu.be/yHJOz_y9rZE[/embed] How does it work? It’s… read more »
  • Jul 18, 2016

    Protect privacy while using Pokémon GO

    You like playing Pokémon GO? Good, but not forget your privacy! Since this is an augmented reality game, Pokémon GO requires your GPS location and a data connection (either WiFi or cellular data), so you can not expect your privacy to… read more »
  • Jul 18, 2016

    Useful penetration testing tools Cheat Sheet

    Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test. Here the table of contents: Recon and Enumeration NMAP Commands SMB enumeration Other Host Discovery SMB Enumeration Python Local Web Server… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician