Hi, today I’ll talk about a general concept but I didn’t really dig that well since I generally pentest linux-based apps when it is a web assessment I have to do. ISAPI ISAPI is to IIS what CGI is to apache or nginx. Basically it is a method to wrap other programs as web …
Hi, today I’ll talk about a subject a guy from my company talked to me about, not related to a mission so I can talk freely about that. Let’s get started. What’s that about? By defining a specific intent in your Android Manifest, you can create a special link which, when clicked, will try to …
Hi everybody, today I’ll talk a little bit about network protocol and talk about the Border Gateway Protocol or BGP. That’s a protocol I am not familiar at all with and I might do some work on it in the future, because some colleagues told me that it is a protocol worth getting into. …
It is harder and harder for me to write down new articles, not due to lack of content but more because of time and because of confidentiality and NDA. Right now I still want to continue the blog but it is clear for me that the reason I launched the blog doesn’t make a lot …
Hello, today I’ll get back to my [bin] series and talk a little bit more about use-after-free, the vulnerability I’m focusing on because it could be a great way to merge two subjects I like (binary exploitation and web), once I’ll master the exploitation process of these vulnerabilities. I probably won’t be able to exploit …
Hey everybody, today I’ll talk about a subject a lot of people already know about, which is cracking a WiFi, with a little twist I never did before (GPU cracking). I still don’t have internet at my new place so that’s why I looked into that, plus it will always help me for my job. …
Hi, I’ll do a quick write-up of some challenges I did during the quals of Nuit du Hack 2018. We managed to get 12th (compared to 15th last year), so not so bad. I helped on a total of 7 challenges (on 12 we were able to complete) and validated myself 5 of those 7. …
Hello everybody, today I’ll try to exploit a fastbin duplication attack, it is an attack pretty common in capture the flag events these days if I understand correctly and it will help me get into heap exploitation. This attack is pretty simple in theory so it can be easily explained. How does the attack …
Hey, let’s go back to binary exploitation after a quick hiatus. I’ll talk about sigreturn-oriented programming today or SROP in short. I managed to exploit a challenge using that technique today and this post will be more or less a summary of what the technique does and what I did learn along the challenge resolution. …
Hi everyone, I’m writing a quick article to speak about the Insomnihack 2018, which is a security conference held in Geneva, I went there to participate in the Capture the Flag event, or CTF. What is a CTF? A capture the flag event is a security event where information security enthusiasts gather to solve …