• The neverending story about FBI’s TorBrowser 0-Day

    Let’s try to retrace the steps of this strange story July 14, 2015 From Seattlepi.com: A Vancouver middle school teacher accused of collecting child pornography online now faces federal charges. Federal prosecutors in Seattle claim Jay Michaud was caught downloading child pornography… read more »
  • My Weekly #Roundup #74

    Let’s changing! Unless major changes, this will be the last post of “weekly roundup”. Since I migrated the site in a Medium publication, the weekly collection of interesting links has much less sense: the publishing platform is so rapid that… read more »
  • First Edition of “The C Programming Language”, freely available on Internet Archive

    Thanks to “Ok, panico”, who discovered this gem and has shared it with all his readers A beautiful discover, directly from the Internet Archive, free and nicely legal: the first edition (dated 1978) of “The C Programming Language”, the bible the… read more »
  • Marfil — An Extension of the Aircrack-ng Suite used to assess WiFi Network Security

    Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long running dictionary attacks among many computers. The Aircrack-ng suite provides the aircrack-ng tool, which is a 802.11… read more »
  • Happy Towel Day 2016!

    Don’t panic and carry a towel! Towel Day is celebrated every year on 25 May as a tribute to the author Douglas Adams by his fans. On this day, fans openly carry a towel with them, as described in Adams’ The… read more »
  • How to install TWRP custom recovery on Vodafone Smart Prime 6 (VF-895N)

    10 simple steps to install a great custom recovery on your Vodafone Smart Prime 6   Team Win Recovery Project is a Open Source project that develop a great custom recovery. A custom recovery is used for installing custom software on… read more »
  • Another World Source Code Review

    Dedicated to the nerds grown in the 90s Recently i have read an interesting article by Fabien Sanglard about a milestone of videogames: “Another World”. I spent two weeks reading and reverse engineering further the source code of Another World(“Out Of… read more »
  • Brienne and Tormund: love is in the air?

    Just for fun… From WikiOfThrones: Brienne has come to Castle Black for the first time and it looks like she already has a male admirer. This admirer is not a brother of the night’s watch but the wildlingTormund. Although the thought… read more »
  • My Weekly #Roundup #73 — #LinkedIn #TeslaCrypt #MrRobot

    What happened relevant this week? Linkedin, Teslacrypt and other fun stuff! Security & Privacy http://xkcd.com/1683/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Geekness http://www.commitstrip.com/en/2016/05/19/the-childhood-of-a-coder-if-only-it-were-a-game/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]https://youtu.be/-ymNGu8C-as[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Programming http://www.commitstrip.com/en/2016/05/17/understanding-dev-culture/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] http://abstrusegoose.com/249 [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Music [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed]… read more »
  • 117 Million LinkedIn Emails And Passwords for sale on dark web

    LinkedIn’s 2012 data breach was more serious than previously thought http://trdealmgn4uvm42g.onion/listing/3600 An hacker, who goes by the name peace_of_mind, is trying to sell the account information, including emails and passwords, of 117 million LinkedIn users, and says that the data… read more »
  • Raspberry Pi + Thermal Printer = Instant Camera!

    An undeniably fun project: a camera made with a Raspberry Pi Model A+ with the Pi Camera Board and a thermal receipt printer. https://vine.co/v/iQbiAxKnwFP Coming it around $90 total for everything, more information on Adafruit’s Website. … read more »
  • CVE-2016–1287: Cisco ASA Software IKEv1 / IKEv2 Buffer Overflow, proof of concept released

    Exodus Intelligence have released the proof of concept code on their GitHub page On February, 10 2016 a vulnerability related to the Internet Key Exchange (IKE) protocol implementation of Cisco devices (CVE-2016–1287) was ufficially released. Yesterday, the researchers who found this… read more »
  • Check and Fix SD Card from the android terminal emulator

    Your Android SD card gets “corrupted” and you don’t have a PC to connect the smartphone and make the check of SD card? It’s possibile to make this operation directly from the smartphone? (rooted and with busybox installed, of course!)… read more »
  • A Memory Access Violation in Symantec Antivirus Engine could crash your windows system

    Symantec’s Anti-Virus Engine was susceptible to memory access violation due to a kernel-level flaw when parsing a specifically-crafted PE header file. The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death… read more »
  • Microsoft will double the number of Ads in the start menu of Windows 10?

    I just read this on The Verge: [embed]http://www.theverge.com/2016/5/16/11682164/microsoft-windows-10-promoted-apps-start-menu-anniversary-update[/embed] Seriously? Ads? But, what kind of Ads? Really, by reading the article it turns out that the “Ads” are just placeholders for applications that Microsoft ‘recommends’ for download, differentiated by country: Promoted apps… read more »
  • SQL Injection in a Nutshell

    Ay Caramba! … read more »
  • Crashing OSX and iOS apps with a simple PNG image

    Lander Brandt has discovered a denial of service vulnerability in ImageIO, a library of utilities for parsing various image formats. Which apps as affected? It’s used in many OS X and iOS applications including: Tweetbot Safari Messages Mail Preview Some… read more »
  • Practical Malware Analysis, a complete starter kit

    Anyone who works in cybersecurity should read Practical Malware Analysis. Topics covered are the following: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and… read more »
  • CVE-2016–4117: a new Adobe Flash 0-DAY in the wild

    Adobe has released a patch (APSB16–15) for a flash vulnerability (CVE-2016-4117) detected on May 8, 2016 by FireEye. FireEye has discovered an attack method based on embedding the Flash exploit inside a Microsoft Office document. The attacker hosts the MSOffice… read more »
  • Fast de-obfuscation of javascript code

    In the last days, I had to examine the obfuscated JavaScript code inside of some malicious html pages. The original javascript code The obfuscation method is the classic ‘array-mapped’: you declare an array of functions and variable names that will… read more »