AdBlock or uBlock? Neither!

Block ads directly from the hosts file Browser extensions for Ads blocking usually works well, but in some cases they use a lot of memory and CPU, especially with really complex web pages. A really god solution for ads blocking, with a minimal footprint on browser performances was developed by Dan Pollock: with some modifications in…

Google Dorks, a brief list of resources

Google hacking for fun and profit In 2002, Johnny Long began to collect interesting Google search queries that uncovers vulnerable systems or sensitive information, and calls them “Google dorks”. We identify with “Google Dorking” the method for finding vulnerable targets using the google dorks in order to obtain usernames and passwords, email lists, sensitive documents and…

My online account has been hacked! What can i do right now?

Because “reset your password” is not enough! Some weeks ago i’ve written a post about the rules that must be followed when your PC was hacked, talking about system restore, backups and password change. So today i wat to share an interesting article by Ryan McGeehan focused on account takeover: Victims of account takeover have a…

Are you still using telnet on Cisco devices? I think you should disable it!

The vulnerability is still unpatched Cisco has published an advisory concerning a vulnerability in its product, discovered while analyzing the “Vault 7” documentation published by Wikileaks last week. The vulnerability affects the Cluster Management Protocol in Cisco IOS and Cisco IOS XE Software and if exploited could allow a remote attacker to remotely execute malicious…

Open Source Intelligence tools for social media: my own list

A constantly updated list of OSINT Sources   I continue the publication of my lists of OSINT sources, this time with a list focused on social networks public data. Twitter AllMyTweets View all tweets from any Twitter user on one page. Backtweets A twitter time machine which enables you to search through a tweet history for…