All articles

Article Image
Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack
In-depth explanation of the msDS-KeyCredentialLink attribute used in a shadow credentials attack, and how to parse it.
Article Image
Windows debugging - Analyzing a BSOD crash dump
Learn how to analyze a BSOD crash dump on Windows to understand what happens during a system crash and how to troubleshoot effectively.
Article Image
Windows Services passwords stored in the LSA
Windows services often run with a specific account, but where and how are the passwords of the service stored? How to extract them?
Article Image
Python vulnerabilities : Code execution in jinja templates
We will see how to create context-free payloads for jinja2, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
Article Image
Analysis and repair of an IBM Model M keyboard
Complete analysis and restoration of a 1990s mechanical IBM Model M keyboard, an iconic model known for its manufacturing quality and unique buckling spring mechanism.
Article Image
EC2 & RootMe - Challenge réaliste Escalate Me
Writeup du challenge réaliste Escalate Me proposé par la plateforme RootMe à l'European Cyber Cup 2022 à Lille.
Article Image
CVE-2022-29710 - LimeSurvey - XSS with plugin upload in uploadConfirm.php
LimeSurvey v5.3.9 and below allows attackers to include javascript or HTML code in the config.xml file of a plugin.
Article Image
CVE-2022-30780 - Lighttpd - Denial of Service
Some versions of lighttpd mishandles HTTP request with an URL overflowing the maximum URL length, resulting in a denial of service.
Article Image
CVE-2022-26159 - Ametys CMS - Unauthenticated information disclosure
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/domain/en.xml.
Article Image
Useful LDAP queries for Windows Active Directory pentesting
We will see a few common queries to find useful information in LDAP during a Windows Active Directory pentest.
Article Image
Writing an exploit for RemoteMouse 3.008
In this article we will analyze an exploit for RemoteMouse 3.008 allowing unauthenticated keyboard control of a remote machine.
Article Image
Exploiting Adminer's file read vulnerability with LOCAL DATA
Improper Access Control in Adminer versions <= 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the server by connecting a remote MySQL database to the Adminer.
Article Image
Active Directory Sites and Subnets enumeration
Enumerating Active Directory sites and subnets is an important part of the enumeration phase. We will see how to extract them from Windows and linux.
Article Image
GreHack 2021 - Optimizing Server Side Template Injections payloads for jinja2
A talk on optimization of SSTIs payloads in jinja2 to achieve remote code execution, presented at GreHack 2021.
Article Image
Windows Security Questions stored in the LSA
Windows account security questions are a good way to recover your password. Where and how are they stored? How to extract them?
Article Image
Scraping search APIs - Depth first style
We will see how to perform a depth-first search in a web application search APIs to extract database content efficiently.
Article Image
UNIX Shells dropping SUID rights in shellcodes
Newer versions of UNIX shells no longer transfer SUID rights by default. We will see how to get around this protection.
Article Image
Python context free payloads in Mako templates
We will see how to create context-free payloads for Mako, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
Article Image
IBM AS/400 - Configuration TCP/IP
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
Article Image
Python vulnerabilities : Code execution in jinja templates
We will see how to create context-free payloads for jinja2, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
Article Image
CVE-2021-43008 - Adminer - Arbitrary file read
Adminer versions <= 4.6.2 (fixed in version 4.6.3) allow an attacker to perform arbitrary file read on the server by connecting a remote MySQL database to Adminer.
Article Image
Windows Hardening - Disabling the Print Spooler
Windows Print Spooler is a service with many vulnerabilities. In this we will see 3 methods to disable this service.
Article Image
Analysis of the June 2021 data dump containing 700 million Linkedin accounts
On June 22, 2021, an aggregate of data concerning 700 million LinkedIn accounts was offered for sale on a forum. We will analyze its content in detail.
Article Image
IPL types and modes for IBM AS/400
IBM mainframes such as the IBM AS/400 use an Initial Program Load (IPL) at machine startup. We will see what are the different IPL of the AS/400 in this article.
Article Image
Restoring an IBM AS/400 (9401-150)
IBM AS/400s are legendary mainframes still present in many companies. In this article I detail how I completely restored an AS/400 9401-150 server.
Article Image
Windows Reverse Shells Cheatsheet
Windows Reverse Shells : 3 payloads in 1 different languages !
Article Image
SSH Port forwarding
There are different types of port forwarding with an SSH connection. Remote, local, dynamic port forwarding, how does it work, how to choose them? This is what we will see in this article!
Article Image
Exploiting Windows Group Policy Preferences
Group Policy Preferences (GPP) can be very dangerous if they are used to store passwords. To quickly find these in a pentest, we made a tool with Shutdown that crawls and extracts these passwords from Windows shares !
Article Image
UNIX Reverse Shells Cheatsheet
UNIX Reverse Shells : 42 payloads in 17 different languages !
Article Image
HeroCTF 2021 - Rooter l'infra, for fun and CTF points
This writeup describes how I became root on the server hosting the HeroCTF v3 kernel challenges, by exploiting a vulnerable challenge.
Article Image
FCSC 2021 - Writeups of the introduction category
FCSC 2021 - Writeups of the introduction category (Pwn, Crypto, Forensics, Hardware, Reverse, Web)
Article Image
FCSC 2021 - Intro - bofbof
This challenge will cover a basic stack buffer overflow on the bofbof challenge of the France CyberSecurity Challenge (FCSC) 2021
Article Image
FCSC 2021 - Intro - Bonus Points
In this challenge you will discover and exploit the unsigned integer overflow vulnerability, to set an arbitrary score in this service.
Article Image
FCSC 2021 - Intro - Known Plaintext
In this challenge, you will perform an analysis of this XOR cryptosystem to decipher the flag
Article Image
FCSC 2021 - Intro - Dérèglement
This forensics challenge addresses the DOCX file format, in which a flag is hidden in plaintext.
Article Image
FCSC 2021 - Intro - File format
This challenge will teach you the basics of the IQ file format, used to save radio frequencies signal captures.
Article Image
FCSC 2021 - Intro - guessy
In this challenge you will learn how to reverse a basic crackme with several basic validation steps.
Article Image
FCSC 2021 - Intro - La PIN
This challenge focuses on a weak python script using AES GCM for encrypting the flag.
Article Image
FCSC 2021 - Intro - Push it to the limit
This web application is vulnerable to an SQL injection in the login page. We will exploit it to bypass the authentication page and extract the administrator password.
Article Image
FCSC 2021 - Intro - Random Search
This web application allow us to perform a Stored Cross Site Scripting (XSS) attack. We will use it to retrieve cookies from the administrator and get the flag.
Article Image
FCSC 2021 - Intro - Rituel du Boutisme
In this forensics challenge we need to find a flag in a disk image. We will need to change the endianness to read the flag with strings.
Article Image
FCSC 2021 - Intro - Rituel en Chaine
In this forensics challenge, we need to find a flag in a disk image. To do this, we'll use the powerful strings command.
Article Image
FCSC 2021 - Intro - Snake
This challenge gives us access to a python interpreter and asks us to read the flag.txt. We will read the file, and for fun, open a shell afterwards.
Article Image
FCSC 2021 - Intro - Waterfall
A flag was hidden in the spectrogram of this signal. We will open the IQ file and display it as a waterfall to get it !
Article Image
HeroCTF 2021 - DevOps Box writeup
In this challenge, we will attack a DevOps Box, in various steps. We will exploit a Jenkins server to get a user reverse shell and privilege escalation to root using ansible.
Article Image
TTYs and where to find them
TTYs and where to find them
Article Image
Python format string vulnerabilities
Python format strings can be very useful but they can be prone to vulnerabilities when misused.
Article Image
Exploiting Micro Focus Enterprise Server Administration (ESA) 1.09.56 to root the host
In this article I will demonstrate how to exploit Micro Focus Enterprise Server Administration (ESA) 1.09.56 to create a root account on the host server
Article Image
Exploiting CVE-2020-14144 - GiTea Authenticated Remote Code Execution using git hooks
The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood.
Article Image
DVID Writeup 06 - Bluetooth - Characteristics 2
This challenge focuses on Bluetooth Low Energy characteristics for IoT devices.
Article Image
DVID Writeup 05 - Bluetooth - Characteristics
This challenge focuses on Bluetooth Low Energy characteristics for IoT devices.
Article Image
DVID Writeup 04 - Bluetooth - Advertising
This challenge focuses on the advertising phase of Bluetooth Low Energy for IoT devices.
Article Image
DVID Writeup 03 - Firmware - Default password
In this challenge, you will learn about the dangers of default passwords in IoT devices
Article Image
DVID Writeup 02 - Firmware - Hardcoded password
In this challenge, we will focus on an extremely common vulnerability, default hardcoded passwords
Article Image
DVID Writeup 01 - Hardware - Find the Datasheet
In this challenge, you will learn how to burn a firmware and interact with the Damn Vulnerable Iot Device (DVID)
Article Image
Damn Vulnerable IoT Device (DVID) writeup series
The Damn Vulnerable IoT Device (DVID) project is aiming to provide a device to experiment with common attacks on the Internet of Things (IoT)
Article Image
Reverse Shells 101
This article explains the necessary components to create a reverse shell.
Article Image
Constructing a semi-interactive reverse shell with curl
This article details how I created a curl-based reverse shell, from scratch.
Article Image
Constructing a semi-interactive reverse shell with wget
This article details how I created a wget-based reverse shell, from scratch.
Article Image
CVE-2020-16148 - Telmat - Authenticated root RCE
An authenticated code injection on the Administration avancee (Advanced administration) page of Telmat AccessLog, Git@Box and Educ@Box with software version <= 6.0 (TAL_20180415) allows Remote Code Execution (RCE) as root.
Article Image
CVE-2020-16147 - Telmat - Unauthenticated root RCE
An unauthenticated code injection on the login page of Telmat AccessLog, Gît@Box and Educ@Box with software version <= 6.0 (TAL_20180415) allows Remote Code Execution (RCE) as root.
Article Image
PagedOut Issue 2 : What if - Infinite Malloc
What would happen if we tried to allocate an infinite amount of memory ? This is what we will try to discover in this article !
Article Image
Why Building an OS/400 Lab at Home Was Harder Than I Expected