Andrea Fortuna
Just some random thoughts about the Meaning of Life, The Universe, and Everything

  • About
  • Cybersecurity
  • Music

Windows registry Transaction Logs in forensic analysis

During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network.

Continue…
  • Dfir

Karsten Hahn: fileless Ursnif/Gozy static analysis and unpacking

The malware analyst Karsten Hahn recently published a very interesting video about the analysis of a sample of the well-known malware Ursnif.

Continue…
  • Malware Analysis
  • Technology

“My piano didn’t fit in the elevator!”, a piano album

I mean no offense to real piano players but, despite I am a guitarist, I always loved the sound of piano.

Continue…
  • Music
  • Technology

4 WhatsApp alternatives, focused on privacy

The recent controversies related to new WhatsApp‘s Privacy Policy have lead many users to start looking for new alternatives.

Continue…
  • Privacy

How to detect Cobalt Strike Beacons using Volatility

Recently I’ve already written about Cobalt Strike detection during forensics analysis. However, some followers asked my if it was possibile to perform this activities using Volatility, in order to integrate them in existing analysis workflows.

Continue…
  • Dfir

“I’ll Be Home for Christmas”, my Christmas single, is out!

I think that music composition is very calming, then, during my Christmas holidays, I tried to relax as much as I could.

Continue…
  • Music

How to process recent Windows 10 memory dumps in Volatility 2

Today I want to briefly take up a topic already addressed in a previous post: analysis of Windows 10 memory dumps using Volatility 2.

Continue…
  • Dfir
  • Technology
  • Volatility

How to boot an Encase (E01) image using VirtualBox

Sometimes, during an incident analysis, you may need to replicate behaviours of a specific host, perhaps already acquired with a forensic method.

Continue…
  • Dfir
  • Forensics

Mobile forensics: how to identify suspicious network traffic

During a forensic analysis on mobile devices, especially when you are not able to perform a full memory acquisition, a network traffic analysis could be useful in order to identify suspicious activities.

Continue…
  • Dfir
  • Forensics

OSX Forensics: a brief selection of useful tools

Today I’d like to share a brief list of useful tools I use for OSX analysis.

Continue…
  • Dfir
Newer »
« Older
Proudly developed by Andrea Fortuna