Andrea Fortuna
AboutRss
  • Aug 27, 2019

    Warshipping: infiltrate corporate networks using postal service

    In the beginning it was the wardialing: the scan a block of numbers (dialed with specific software and a modem) often related to a company, in order to find out a fax or a modem response. https://www.youtube.com/watch?v=zb1r_uKOew4 With the advent… read more »
  • Aug 26, 2019

    My Weekly RoundUp #104

    Uff..Facebook announces a new privacy tool and a new Matrix's chapter is coming but…"not all that glitters is gold"! Wait! Did you say "Breaking Bad"? Cybersecurity Apple, what are you doing? iOS 12.4 makes it possible to jailbreak your iPhone… read more »
  • Aug 23, 2019

    Google, Mozilla and Apple blocks Kazakhstan root CA certificate to fight government's web surveillance

    Do you remember this post about Kazakhstan government attempts to deploy a root certificate in order to start a spying campaign of citizen's HTTPS traffic? Google, Microsoft, and Mozilla are discussing a plan of action... https://www.andreafortuna.org/2019/07/19/kazakhstan-government-begins-intercepting-all-citizens-https-traffic/ Well, good news! Some… read more »
  • Aug 22, 2019

    How to generate a Volatility profile for a Linux system

    When you start analyzing a Linux memory dump using volatility, the first problem you may need to face is choosing the correct memory profile. In my opinion, the best practice is generate your own profile, using a machine with the… read more »
  • Aug 21, 2019

    USBSamurai: how to make a remote controlled USB HID injecting cable for less than 10$

    An interesting article by Luca Bongiorni explains how to create a remote controlled HID injector cable using some simple hardware components easily purchased on online stores (with less then 10$) https://www.youtube.com/watch?v=kmCjYPdNIPM The main idea (for the hardware-side) is to re-use… read more »
  • Aug 20, 2019

    CVE-2019-9506: the Key Negotiation of Bluetooth (KNOB) Attack

    The vulnerability resides in the way devices choose an entropy value for encryption keys while establishing a connection: an attacker in close proximity to the victim’s device could intercept or manipulate encrypted Bluetooth traffic between two paired devices. Researchers at… read more »
  • Aug 19, 2019

    My Weekly RoundUp #103

    Some interesting topics from BlackHat and DefCon! Technology Japanese user of Microsoft Excel asks: "Why is the SAVE ICON a 'Vending Machine w/ a Beverage dispensed?' " The save icon is not a vending machine https://twitter.com/fea0er/status/1160099135569063936 Privacy A researcher abused the… read more »
  • Aug 16, 2019

    The Making Of "Another World"

    Another World was one of the video games I most loved in my youth. It was also one of the first software on which I had fun to do reverse engineering: with an hexadecimal editor on my Amiga 500 I… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician