The blog is now multilingual

The title says it all, and this post is simply to announce it. From now on, all articles will be available in both English and Spanish. That means that, on the one hand, existing articles have been translated into English and, on the other hand, new articles will be published in both languages. My intention is to keep this so that the whole blog is always in both languages. The default language will be English, but it will always be possible to change it from the new selector that has just appeared at the top.
Read more →

How to monitor nearby bluetooth devices with a single command

Aspaldiko! It’s been a long time since I’ve been around here, it’s been a busy few months (work, moving house, Christmas,… a thousand things), but it was about time I got back to blogging a bit. Although I still have to continue the series on malware analysis, I’ve decided that, in the meantime, I’m going to post a few posts about some things I’ve been tinkering with lately, like this one, about monitoring bluetooth devices.
Read more →

Malware analysis (II) - Basic static analysis: strings and metadata

The day has come. It’s time to pick up where I left off months ago and continue with the series on malware analysis. This is the second part of an article series. In the previous article, I discussed the basics, different techniques for malware analysis, how to obtain samples, and some basic programs for conducting this type of analysis. First of all, it’s important to remember the different types of analysis that exist.
Read more →

Migrating to Hugo

Hello, aspaldiko! It’s been a while since I last posted anything, despite having several ideas in mind and others that I left unfinished (like the series on malware analysis, for example), so it was about time to pick it up again. First things first, I think it was time to give the blog a little refresh. A while back, I migrated it from Jekyll to Gatsby to modernize it a bit, but I’d been wanting to use something simpler for a while.
Read more →

How to get your Top tracks (or whatever info) out of your Spotify account

I’m heavily into web scraping, I know, but this time it’s something a bit different. It’s not your typical web scraping; it’s a small example of how to extract information about your own data. You can get some very interesting insights from the data we generate daily. For instance, in my case, I use Spotify daily to listen to music. I never leave home without headphones, and I even wear them in the bathroom, so I generate a certain amount of data while using Spotify.
Read more →

How to automate flat-hunting with a Telegram bot

I am looking for a flat. Looking for a flat is a shitty process. There is a strangely small number of flats in my city and the ones that are available disappear quickly. I’m too lazy to spend all my time looking for a flat. It’s not really that complicated, but sometimes I’m busy and I forget to look that day, or I’m out and it’s more hassle with my phone.
Read more →

Pwnkit: Vulnerability in Polkit (CVE-2021-4034) in 5 minutes

Another new CVE that has been making headlines. The CVE-2021-4034 was released a few days ago and has spread like wildfire. I can’t really contribute much more to the topic that hasn’t already been said, but it might be good to give a brief overview of the CVE and how to exploit it (which is trivial). What is polkit? Polkit is a tool for controlling privileges on Unix-like systems. It can control how unprivileged processes communicate with privileged processes.
Read more →

Malware analysis (I) - How to get started in malware analysis

We are living in a world full of malware. Everyone has had a problem with some kind of virus or at least knows someone who has, and everyone knows or works in a company that has been attacked using some kind of malware. Personally, I find malware fascinating. What fascinates me about it is how effective they are. They are carefully designed to do their job and there are such sophisticated examples that it is amazing to see how someone could have thought of programming something in such a way to exploit a vulnerability or to use certain kinds of evasion mechanisms.
Read more →

How to download images from an Instagram profile with Python and web scrapping

Instagram is the social network to showing off. It’s probably the social network I use the most. I’m too young to actively use Facebook and too old to even consider creating TikTok (if you see it happening, I give you permission to kill me). I also use twitter, but more as a “news” provider, but I don’t post anything on that one. So all my posts tend to go to Instagram.
Read more →

Initial commit

I’ve been thinking about creating a blog for years. I don’t know if it’s because I’ve been locked up in my house for 3 weeks (and what’s left) due to the quarantine and I’m quite bored or if it’s just that now I’m really ready to get down to it, but even so I’ve thrown myself into the adventure. For those who don’t know me, my name is Ander Granado. I’m a 25-year-old guy from Vitoria-Gasteiz who studied Computer Engineering and works as a software developer.
Read more →