avatar  

As my second week in my security intensive study a huge opportunity appeared in my life! Casually, I’ve been asked to guide a group of students into Network monitoring and Forensic, which is already my favourite security module. I wanted to study in a wider range, as I already said in week one, but right now I should put most of my efforts in the group goals, also I’m excited with the opportunity of learning from these guys.

Anyway, I’d like to start this article with a brief explanation on “where to sniff”, where in a network should we...

avatar  

I’m very interested in cybersecurity and I’m studying it on my own alongside computer engineering. In order to improve this research, I decided to organize an intense studying sprint in cybersec, and jumping into “semi professional” projects, using Zerodium and similar. Before presenting a formal vulnerability to these pages, I want to prepare myself. I’m used to work with Network System Monitoring and similar, but I want to reach a wider action zone.

This week I started looking for resources, books, pages and inspiration. I read a couple of books, but they seemed quite for begginners (as they firstly speak...

avatar  

Many people has heard about Bitcoins, the decentralized virtual currency, but as famous as it could be, most of the population doesn’t know exactly what it is and how it works, not to mention is barely used.

What are BITCOINS?

A Bitcoin is a decentralized, worldwide, virtual currency system. It’s a peer-to-peer distributed system in which users own a key that are usually stored in digital wallets on each user’s computer, and that key is used to prove the ownership of a transaction unblocking the value and letting different owners use it....

avatar  

You might have heard about the technique of Ducky debugging in which you tell a rubber ducky your dev problems and then you know how to solve them, but this is not the case, we are talking about nasty duckies here, not cute problem solvers ones.

Regardless the name, Rubber Ducky is the name of a hacking injection device that consist in a pen drive and a micro SD. The pack itself also comes with the case, and a couple of USB adapters.

The device imitates the human keyboard input, “Humans use...

avatar  

I’m a very chaotic person, and I tend to forget the date for returning books to the library, for example. The last time I went to the local library, I wanted to take out a book, but apparently my library id-card was very old (I still had the junior card) and the new library assistant asked me to change it. In the process, I felt quite insecure to whom I was giving my information to. To start with, all the system seemed to rely on Windows 95, which already gave me the thrills, but apart from that, all the process...