Andrea Fortuna
AboutRss
  • Aug 22, 2016

    BENIGNCERTAIN, the proof that the tools stolen to Equation Group are authentic

    And shows how the National Security Agency was able to decrypt VPN traffic! Some days ago, an hackers group named “The Shadow Brokers” has announced to have hacked a group linked to the NSA and dumped a lot of its hacking… read more »
  • Aug 19, 2016

    Tatyana Ryzhkova talks about fingernails length and shaping

    In this interesting video, the bielorussian guitar player Tatyana Ryzhkova talks about her fingernails shaping. [embed]https://www.youtube.com/watch?v=fDzFTBJRJnI[/embed] Tatyana uses a right hand posture rotated outwards, and this implies an asymmetric length of the fingernails, with the index fingernail visibly longer than… read more »
  • Aug 18, 2016

    How to Host a Tor Hidden Service on a spare Android device

    How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web! How make it? Three simple steps! 1 — Install Tor Install OrBot app from Google Play: [embed]https://play.google.com/store/apps/details?id=org.torproject.android[/embed] Then enable the ‘Hidden Service Hosting’ option… read more »
  • Aug 17, 2016

    Scan the Deep Web could be useful to discover 0-Day vulnerabilities?

    A group of researchers of Arizona State University think it could work! In the paper titled “Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence”, a group of 10 researchers ( Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra,… read more »
  • Aug 16, 2016

    Cheat Sheet for Malware Analysis

    A cheat sheet of shortcuts and tips for analyzing and reverse-engineering malware Lenny Zeltser teaches digital forensics and anti-malware courses at SANS Institute: on his site, at https://zeltser.com/cheat-sheets/, has published a lot of useful cheat sheets. Today i want to… read more »
  • Aug 15, 2016

    Learning with Legends: a session with Pepe Romero

    Pepe Romero talks about the Concierto de Aranjuez, The Universe, and Everything! From the youtube channel of the “Guitar Foundation of America” a useful video in which Pepe Romero talks about the “Concierto de Aranjuez”, by Joaquín Rodrigo. [embed]https://www.youtube.com/watch?v=4AYAf-tC8HI[/embed] Pepe… read more »
  • Aug 12, 2016

    Rekall, a framework for memory forensic

    An end-to-end solution to incident responders and forensic analysts Rekall is a collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory samples. The extraction techniques are performed completely independent… read more »
  • Aug 11, 2016

    Project Sauron (aka “Strider”): what is important to know?

    It’s a trend topic, I think is useful summing up the highlights taken from the major sites. The malware has been active since at least 2011 and has been discovered on 30 infected organizations in Russia, Iran, Rwanda and possibly in… read more »
  • Aug 10, 2016

    #DefCon: Smart Thermostat hacked to host a ransomware

    Recently we have heard many scary stories of hacking IoT devices, but how realistic is the threat? This is not just a hypothetical scenario: at the DEFCON24 security conference in Las Vegas, Ken Munro and Andrew Tierney of PenTestPartners have showed… read more »
  • Aug 9, 2016

    Viral.JS: P2P distribution for Web applications

    Do we still need a CDN? PixelsCommander ha released an interesting project called ViralSJ: a Node.js/Express.js library to distribute application via P2P, using WebRTC. ViralJS creates a self-establishing and self-evolving CDN which moves data closer to client. P2P content distribution allows… read more »
  • Aug 8, 2016

    New Android vulnerability affects over 900 million Qualcomm devices

    Yep! Another vulnerability in Qualcomm devices, dubbed “QuadRooter”, was disclosed by Check Point in a session at DEF CON 24 in Las Vegas QuadRooter is a set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with… read more »
  • Aug 8, 2016

    Simple SMB Scanner with a single line of shell

    Need a simple smb scanner to search windows shares on a network? Here a very simple script, made with nmap, smbclient and some shell commands. Usage Obviously, the scanner uses the same syntax used by nmap: ./smbscanner 192.168.0.* Dependencies Just nmap… read more »
  • Aug 8, 2016

    A website could track your smartphone location using the battery status data?

    “It could work!” Some months ago, researchers at Stanford University have published a paper about a new technique, named “PowerSpy”, that has capability to gather the geolocation of Android phones by simply by measuring the battery usage of the phone over… read more »
  • Aug 5, 2016

    Do you like Shodan? You will love Censys!

    A new search engine, similar to Shodan.io but more hacker-friendly Censys is a search engine that was released in October by researchers from the University of Michigan as part of an open source project that aims at maintaining a “complete… read more »
  • Aug 5, 2016

    Malware analysis, my own list of tools and resources

    A constantly updated list — Last update: August 2, 2018 During my daily activities of analysis and research, often I discover new useful tools. I collected them in this list (periodically updated). Enjoy! Detection AnalyzePE — Wrapper for a variety of tools for reporting on… read more »
  • Aug 4, 2016

    Are you looking for the ideal smartwatch? Do it yourself!

    Make your own nerd smartwatch from an old Nokia 1100 Using an old Nokia 1100, connecting it to an Arduino brain, and setting up the software, you’ll have a bulky, awful, but totally DIY smartwatch that can connect to your phone… read more »
  • Aug 3, 2016

    Fun in the space, with a $50,000 camera, some water and…an Alka Seltzer

    Yes, science is also funny! What you see in the videos below is not exactly a scientific experiment.It’s more like a moment of relaxation, a fun time between the daily activities on International Space Station. The astronaut Terry Virts inserts an… read more »
  • Aug 2, 2016

    peace_of_mind is back again: now sells 200 Million Yahoo accounts!

    The price? Quite cheap: only 3 Bitcoins (US$1,824) After data leaks of Linkedin and VK, peace_of_mind is back: it put for sale on the marketplace The Real Deal 200 million Yahoo logins. Peace says in the description that the database… read more »
  • Aug 2, 2016

    Andrés Segovia — The Song Of The Guitar

    Old but gold! Several years ago, when I was a young guitar student in the hills around Rome, I met many difficulties to be able to find, in the only music store in the country, this videotape. Once received, i inserted… read more »
  • Aug 1, 2016

    Detect crypto ransomware in realtime with Cryptostalker

    Interesting project found on GitHub Cryptostalker and the original project randumb are the work of Sean Williams, who wanted to create a tool that monitored the filesystem for newly written files, and if the files contained random data, the sign of… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician