• FLOSS: FireEye Labs Obfuscated String Solver — Automatically extract obfuscated strings from…

    Malware authors pack their software to resist reverse engineering and enable their operations to survive longer. However, many features of packing are easy to automatically identify during static or dynamic analysis. Therefore, some authors obfuscate only the most sensitive resources… read more »
  • Antonio Lauro, “Valse Venezolano no. 2”

    My comments about the piece, and an example of how NOT playing it! The author Antonio Lauro (August 3, 1917 — April 18, 1986) was the son of an Italian immigrant who was an amateur singer and guitarist. His musical lessons began with… read more »
  • The neverending story about FBI’s TorBrowser 0-Day

    Let’s try to retrace the steps of this strange story July 14, 2015 From Seattlepi.com: A Vancouver middle school teacher accused of collecting child pornography online now faces federal charges. Federal prosecutors in Seattle claim Jay Michaud was caught downloading child pornography… read more »
  • My Weekly #Roundup #74

    Let’s changing! Unless major changes, this will be the last post of “weekly roundup”. Since I migrated the site in a Medium publication, the weekly collection of interesting links has much less sense: the publishing platform is so rapid that… read more »
  • First Edition of “The C Programming Language”, freely available on Internet Archive

    Thanks to “Ok, panico”, who discovered this gem and has shared it with all his readers A beautiful discover, directly from the Internet Archive, free and nicely legal: the first edition (dated 1978) of “The C Programming Language”, the bible the… read more »
  • Marfil — An Extension of the Aircrack-ng Suite used to assess WiFi Network Security

    Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long running dictionary attacks among many computers. The Aircrack-ng suite provides the aircrack-ng tool, which is a 802.11… read more »
  • Happy Towel Day 2016!

    Don’t panic and carry a towel! Towel Day is celebrated every year on 25 May as a tribute to the author Douglas Adams by his fans. On this day, fans openly carry a towel with them, as described in Adams’ The… read more »
  • How to install TWRP custom recovery on Vodafone Smart Prime 6 (VF-895N)

    10 simple steps to install a great custom recovery on your Vodafone Smart Prime 6   Team Win Recovery Project is a Open Source project that develop a great custom recovery. A custom recovery is used for installing custom software on… read more »
  • Another World Source Code Review

    Dedicated to the nerds grown in the 90s Recently i have read an interesting article by Fabien Sanglard about a milestone of videogames: “Another World”. I spent two weeks reading and reverse engineering further the source code of Another World(“Out Of… read more »
  • Brienne and Tormund: love is in the air?

    Just for fun… From WikiOfThrones: Brienne has come to Castle Black for the first time and it looks like she already has a male admirer. This admirer is not a brother of the night’s watch but the wildlingTormund. Although the thought… read more »
  • My Weekly #Roundup #73 — #LinkedIn #TeslaCrypt #MrRobot

    What happened relevant this week? Linkedin, Teslacrypt and other fun stuff! Security & Privacy http://xkcd.com/1683/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Geekness http://www.commitstrip.com/en/2016/05/19/the-childhood-of-a-coder-if-only-it-were-a-game/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]https://youtu.be/-ymNGu8C-as[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Programming http://www.commitstrip.com/en/2016/05/17/understanding-dev-culture/ [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] http://abstrusegoose.com/249 [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] Music [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed] [embed]http://www.bleepingcomputer.com/news/security/teslacrypt-shuts-down-and-releases-master-decryption-key/[/embed]… read more »
  • 117 Million LinkedIn Emails And Passwords for sale on dark web

    LinkedIn’s 2012 data breach was more serious than previously thought http://trdealmgn4uvm42g.onion/listing/3600 An hacker, who goes by the name peace_of_mind, is trying to sell the account information, including emails and passwords, of 117 million LinkedIn users, and says that the data… read more »
  • Raspberry Pi + Thermal Printer = Instant Camera!

    An undeniably fun project: a camera made with a Raspberry Pi Model A+ with the Pi Camera Board and a thermal receipt printer. https://vine.co/v/iQbiAxKnwFP Coming it around $90 total for everything, more information on Adafruit’s Website. … read more »
  • CVE-2016–1287: Cisco ASA Software IKEv1 / IKEv2 Buffer Overflow, proof of concept released

    Exodus Intelligence have released the proof of concept code on their GitHub page On February, 10 2016 a vulnerability related to the Internet Key Exchange (IKE) protocol implementation of Cisco devices (CVE-2016–1287) was ufficially released. Yesterday, the researchers who found this… read more »
  • Check and Fix SD Card from the android terminal emulator

    Your Android SD card gets “corrupted” and you don’t have a PC to connect the smartphone and make the check of SD card? It’s possibile to make this operation directly from the smartphone? (rooted and with busybox installed, of course!)… read more »
  • A Memory Access Violation in Symantec Antivirus Engine could crash your windows system

    Symantec’s Anti-Virus Engine was susceptible to memory access violation due to a kernel-level flaw when parsing a specifically-crafted PE header file. The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death… read more »
  • Microsoft will double the number of Ads in the start menu of Windows 10?

    I just read this on The Verge: [embed]http://www.theverge.com/2016/5/16/11682164/microsoft-windows-10-promoted-apps-start-menu-anniversary-update[/embed] Seriously? Ads? But, what kind of Ads? Really, by reading the article it turns out that the “Ads” are just placeholders for applications that Microsoft ‘recommends’ for download, differentiated by country: Promoted apps… read more »
  • SQL Injection in a Nutshell

    Ay Caramba! … read more »
  • Crashing OSX and iOS apps with a simple PNG image

    Lander Brandt has discovered a denial of service vulnerability in ImageIO, a library of utilities for parsing various image formats. Which apps as affected? It’s used in many OS X and iOS applications including: Tweetbot Safari Messages Mail Preview Some… read more »
  • Practical Malware Analysis, a complete starter kit

    Anyone who works in cybersecurity should read Practical Malware Analysis. Topics covered are the following: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and… read more »