Andrea Fortuna
AboutRss
  • Sep 14, 2016

    PunkSpider, a powerful web application vulnerability search engine

    With great power comes great responsibility! PunkSPIDER it’s an extremely powerful tool, the results of which should be used with extreme care and awareness And the developers has the same opinion: when you enter the site in fact you are… read more »
  • Sep 13, 2016

    CVE-2016-6662: a critical MySQL Zero-Day

    Oracle, are you there? We need you! Dawid Golunski, a Polish security researcher discovered several security issues in the MySQL DBMS, including a vulnerability flaw (CVE-2016–6662) that can be exploited by a remote attacker to inject malicious settings into my.cnf configuration… read more »
  • Sep 13, 2016

    SSMA — Simple Static Malware Analyzer

    Simple but powerful malware analysis tool SSMA is a simple malware analyzer written in Python 3 by Lasha Khasaia. Features: Searches for websites, e-mail addresses, IP addresses in the strings of the file. Looks for Windows functions commonly used by malware.… read more »
  • Sep 12, 2016

    VirtualBox on Linux: solve USB access problems

    With just a simple command! Have you just installed VirtualBox on your Linux Box, but the virtual machine cannot access the host’s USB ports? It’s just a permission issue: simply run VirtualBox as root, or (more correctly) add you user account… read more »
  • Sep 9, 2016

    Steal credentials from locked machines? Yes, it’s possible with a customized USB dongle.

    And it works on Windows and OSX! The security researcher Rob Fuller has discovered a new attack method that can be used to steal credentials from a locked computer (but, with the user logged in) and works on both Windows and… read more »
  • Sep 8, 2016

    Open a VMWare Disk Image (VMDK) with Autopsy for forensics analisys

    Using qemu-img! About VMXRAY i have already spoken in a previous post. But if i need to open a Virtual Disk Image with a forensics tool like Autopsy? Just convert the VMDK file into a format that can be read… read more »
  • Sep 7, 2016

    The LiberoMail users database was breached

    Change your password as soon as possible! The italian email hosting “Libero Mail” has announced that has suffered an attack that resulted in the compromise of its user database: Ti informiamo che il sistema di sicurezza di Libero ha rilevato… read more »
  • Sep 7, 2016

    VMXRAY: explore VM disk images in your browser

    The power of HTML5! You need to extract a single file from a disk image of a Virtual Machine (VMWare, VirtualBox and other), or just navigate the disk without install and start a virtualization tool? Pretty simple, with VMXRAY: VMXRay is… read more »
  • Sep 6, 2016

    The amazing Origami Millennium Falcon!

    The only paper ship that can be made in less than 12 parsecs A funny infographic from DeAgostini Model Space: And here another version from Tadashi Mori: [embed]https://www.youtube.com/watch?v=XqRGl4O-WzA[/embed] Enjoy! :-) … read more »
  • Sep 5, 2016

    30 Nmap Command Examples from nixCraft

    Userful for Sys/Network Admins Great post from nixCraft about the famous security tool Nmap: The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out… read more »
  • Sep 2, 2016

    Short Linux Tips: using SSH with a Socks Proxy

    Short but useful! Need to connect to an ssh server through a socks4/5 proxy? (for example, to connect to a tor hidden server?) Simple, with this short bash snippet: ssh -o ProxyCommand=’nc -x 127.0.0.1:9150 %h %p’ user@host … read more »
  • Sep 1, 2016

    Who is the best Batman’s antagonist, Jared Leto or Heath Ledger?

    Casey Chan on Gizmodo has made a good analysis Have you seen Suicide Squad? Do you like Jared Leto’s Joker or your preferred villain still remains Heath Ledger? Casey Chan on Gizmodo has written a good article about this two iconic… read more »
  • Aug 31, 2016

    Windows 10: a deep dive on privacy issues by EFF

    And some interesting comments from Bruce Schneier’s blog Bruce Schneier, on his blog, has linked an interesting article from eff.org about privacy implications of Windows 10: The trouble with Windows 10 doesn’t end with forcing users to download the operating… read more »
  • Aug 30, 2016

    Useful tips about improvisation on classical guitar

    Ten tips from three great guitarists Classical Guitar has published a really useful article about improvisation, with 10 tips from three great guitar players: Andrew York, Roland Dyens, and Dušan Bogdanovic. Classical guitar students may encounter a lack of standard… read more »
  • Aug 29, 2016

    The demo of graphic adventure game inspired by “Stranger Things” is available!

    Only a few days ago, the creators of the series have suggested that “Stranger Things” could become a video game. No sooner said than done. Speaking with IGN, Matt and Ross Duffer revealed that the timeline of next season of “Stranger… read more »
  • Aug 26, 2016

    A persistent and sophisticated malware targets all unpatched iOS devices

    Upgrade your device to iOS 9.3.5, ASAP! Citizen Lab and Lookout have discovered an active threat using three critical iOS zero-day vulnerabilities: when exploited, creates an attack chain that subverts even Apple’s strong security environment. The vulnerabilities CVE-2016–4655: Memory Corruption in… read more »
  • Aug 25, 2016

    Steganography Data Hiding and Watermarking with OpenStego

    Be brave, basically steganography is not hard! OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file. Watermarking: Sign files with an invisible signature. It can be used to detect unauthorized… read more »
  • Aug 24, 2016

    Small interesting *nix facts: the infamous fork bomb

    Maybe it’s a dated topic, but it’s always funny! What is a fork bomb? A fork bomb (also know as Rabbit Virus or Wabbit) is a denial-of-service attack wherein a process continually replicates itself, slowing down or crashing the system due to… read more »
  • Aug 23, 2016

    MacroShop , a collection of scripts for embedding malware payloads in Microsoft Office files

    A new youth for macro viruses? Recently, with a colleague were discussing how Office macros are becoming a vehicle widely used by malware distributors. On this Github repository i have found Macroshop, a collection of python script to aid the embedding… read more »
  • Aug 23, 2016

    Five complete solutions for email server deploy

    For inexperienced or impatient admins! Five complete solutions for rapidly deploy a complete mail server with a single installation. Enjoy! Citadel: Versatile and powerful mail server, written in C.License: GPLv3 iRedMail: Mail server solution based on Postfix and Dovecot.License: GPLv3… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician