Podalirius
All Articles
Writeups
Press and Conferences
CVEs
|
|
All articles
AS/400 Forensics: Retrieving your Licence Keys from disk images
December 15, 2025
A technical guide to forensic techniques for retrieving lost or forgotten licence keys from IBM AS/400 systems.
as400
forensics
ibm
keys
licence
mainframe
recovery
Rescuing one of the first IBM AS/400, a 9406-B30 from 1988
November 28, 2025
How we rescued one of the earliest IBM AS/400 machines ever built, a 9406-B30 manufactured in July 1988, one month before the official announcement, from being scrapped for gold.
as400
hardware
ibm
mainframe
restoration
IBM AS/400 - Setup Telnet 5250 Server
September 10, 2025
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
as400
ibm
network
telnet
5250
IBM AS/400 - Setup Telnet 5250 Server
September 10, 2025
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
as400
ibm
network
telnet
5250
IBM AS/400 - TCP/IP Setup
September 7, 2025
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
as400
ibm
network
BloodHound - Generating OpenGraphs in Python with bhopengraph
August 12, 2025
How I built bhopengraph, a Python library to generate valid BloodHound OpenGraph JSON files for custom data ingestion. Covers the OpenGraph schema, library design, practical examples, and lessons learned.
bloodhound
graph
opengraph
python
tooling
Analysis and repair of an IBM Model M keyboard
July 2, 2025
Complete analysis and restoration of a 1990s mechanical IBM Model M keyboard, an iconic model known for its manufacturing quality and unique buckling spring mechanism.
as400
hardware
ibm
infowindow
keyboard
mainframe
restoration
Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack
January 18, 2025
In-depth explanation of the msDS-KeyCredentialLink attribute used in a shadow credentials attack, and how to parse it.
active-directory
attribute
credentials
DNwithBinary
ldap
msDS-KeyCredentialLink
research
RSAKeyMaterial
shadow
windows
Windows debugging - Analyzing a BSOD crash dump
April 20, 2023
Learn how to analyze a BSOD crash dump on Windows to understand what happens during a system crash and how to troubleshoot effectively.
crash-dump
debugging
windows
Windows Services passwords stored in the LSA
April 6, 2023
Windows services often run with a specific account, but where and how are the passwords of the service stored? How to extract them?
lsa
password
recovery
secrets
secretsdump
windows
Python vulnerabilities : Code execution in jinja templates
July 27, 2022
We will see how to create context-free payloads for jinja2, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
code
contexte
execution
exploit
independant
injection
jinja
jinja2
python
server
side
ssti
template
vulnerabilities
EC2 & RootMe - Challenge réaliste Escalate Me
June 10, 2022
Writeup du challenge réaliste Escalate Me proposé par la plateforme RootMe à l'European Cyber Cup 2022 à Lille.
ctf
privilege-escalation
web-security
writeup
CVE-2022-29710 - LimeSurvey - XSS with plugin upload in uploadConfirm.php
May 25, 2022
LimeSurvey v5.3.9 and below allows attackers to include javascript or HTML code in the config.xml file of a plugin.
cve
exploit
xss
CVE-2022-30780 - Lighttpd - Denial of Service
May 16, 2022
Some versions of lighttpd mishandles HTTP request with an URL overflowing the maximum URL length, resulting in a denial of service.
cve
denial
dos
lighttpd
lighttpd1.4
of
service
CVE-2022-26159 - Ametys CMS - Unauthenticated information disclosure
February 28, 2022
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/domain/en.xml.
ametys
cms
cve
disclosure
information
Useful LDAP queries for Windows Active Directory pentesting
December 21, 2021
We will see a few common queries to find useful information in LDAP during a Windows Active Directory pentest.
active-directory
ldap
pentesting
windows
Writing an exploit for RemoteMouse 3.008
December 16, 2021
In this article we will analyze an exploit for RemoteMouse 3.008 allowing unauthenticated keyboard control of a remote machine.
exploit
remotemouse
reverse engineering
Exploiting Adminer's file read vulnerability with LOCAL DATA
December 12, 2021
Improper Access Control in Adminer versions <= 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the server by connecting a remote MySQL database to the Adminer.
Active Directory Sites and Subnets enumeration
November 23, 2021
Enumerating Active Directory sites and subnets is an important part of the enumeration phase. We will see how to extract them from Windows and linux.
active-directory
enumeration
ldap
GreHack 2021 - Optimizing Server Side Template Injections payloads for jinja2
November 19, 2021
A talk on optimization of SSTIs payloads in jinja2 to achieve remote code execution, presented at GreHack 2021.
grehack
jinja2
optimization
payloads
remote-code-execution
ssti
Windows Security Questions stored in the LSA
October 4, 2021
Windows account security questions are a good way to recover your password. Where and how are they stored? How to extract them?
lsa
password
recovery
secrets
secretsdump
windows
Scraping search APIs - Depth first style
September 28, 2021
We will see how to perform a depth-first search in a web application search APIs to extract database content efficiently.
api
content
database
depth-first-search
extraction
optimization
search-api
web-application
UNIX Shells dropping SUID rights in shellcodes
September 2, 2021
Newer versions of UNIX shells no longer transfer SUID rights by default. We will see how to get around this protection.
rights
setuid
shellcodes
suid
Python context free payloads in Mako templates
August 26, 2021
We will see how to create context-free payloads for Mako, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
code
contexte
execution
exploit
independant
injection
jinja
jinja2
python
server
side
ssti
template
vulnerabilities
Python vulnerabilities : Code execution in jinja templates
July 27, 2021
We will see how to create context-free payloads for jinja2, always allowing direct access to the os module in a jinja2 template without requirements. These payloads will be particularly useful for exploiting SSTI vulnerabilities.
code
contexte
execution
exploit
independant
injection
jinja
jinja2
python
server
side
ssti
template
vulnerabilities
CVE-2021-43008 - Adminer - Arbitrary file read
July 17, 2021
Adminer versions <= 4.6.2 (fixed in version 4.6.3) allow an attacker to perform arbitrary file read on the server by connecting a remote MySQL database to Adminer.
adminer
cve
file-read
Windows Hardening - Disabling the Print Spooler
July 5, 2021
Windows Print Spooler is a service with many vulnerabilities. In this we will see 3 methods to disable this service.
hardening
microsoft
print-spooler
windows
Analysis of the June 2021 data dump containing 700 million Linkedin accounts
June 28, 2021
On June 22, 2021, an aggregate of data concerning 700 million LinkedIn accounts was offered for sale on a forum. We will analyze its content in detail.
data-leak
linkedin
scrapping
IPL types and modes for IBM AS/400
June 16, 2021
IBM mainframes such as the IBM AS/400 use an Initial Program Load (IPL) at machine startup. We will see what are the different IPL of the AS/400 in this article.
as400
ibm
ipl
Restoring an IBM AS/400 (9401-150)
June 10, 2021
IBM AS/400s are legendary mainframes still present in many companies. In this article I detail how I completely restored an AS/400 9401-150 server.
as400
ibm
mainframe
Windows Reverse Shells Cheatsheet
May 26, 2021
Windows Reverse Shells : 3 payloads in 1 different languages !
cheatsheet
reverse-shell
windows
SSH Port forwarding
May 24, 2021
There are different types of port forwarding with an SSH connection. Remote, local, dynamic port forwarding, how does it work, how to choose them? This is what we will see in this article!
forwarding
port
ssh
Exploiting Windows Group Policy Preferences
May 20, 2021
Group Policy Preferences (GPP) can be very dangerous if they are used to store passwords. To quickly find these in a pentest, we made a tool with Shutdown that crawls and extracts these passwords from Windows shares !
group
passwords
policy
UNIX Reverse Shells Cheatsheet
May 17, 2021
UNIX Reverse Shells : 42 payloads in 17 different languages !
cheatsheet
reverse-shell
unix
HeroCTF 2021 - Rooter l'infra, for fun and CTF points
May 6, 2021
This writeup describes how I became root on the server hosting the HeroCTF v3 kernel challenges, by exploiting a vulnerable challenge.
heroctf
qemu
root
FCSC 2021 - Writeups of the introduction category
May 3, 2021
FCSC 2021 - Writeups of the introduction category (Pwn, Crypto, Forensics, Hardware, Reverse, Web)
fcsc
intro
FCSC 2021 - Intro - bofbof
May 3, 2021
This challenge will cover a basic stack buffer overflow on the bofbof challenge of the France CyberSecurity Challenge (FCSC) 2021
fcsc
intro
pwn
FCSC 2021 - Intro - Bonus Points
May 3, 2021
In this challenge you will discover and exploit the unsigned integer overflow vulnerability, to set an arbitrary score in this service.
fcsc
intro
pwn
FCSC 2021 - Intro - Known Plaintext
May 3, 2021
In this challenge, you will perform an analysis of this XOR cryptosystem to decipher the flag
crypto
fcsc
intro
FCSC 2021 - Intro - Dérèglement
May 3, 2021
This forensics challenge addresses the DOCX file format, in which a flag is hidden in plaintext.
fcsc
forensics
intro
FCSC 2021 - Intro - File format
May 3, 2021
This challenge will teach you the basics of the IQ file format, used to save radio frequencies signal captures.
fcsc
hardware
intro
FCSC 2021 - Intro - guessy
May 3, 2021
In this challenge you will learn how to reverse a basic crackme with several basic validation steps.
fcsc
intro
reverse
FCSC 2021 - Intro - La PIN
May 3, 2021
This challenge focuses on a weak python script using AES GCM for encrypting the flag.
crypto
fcsc
intro
FCSC 2021 - Intro - Push it to the limit
May 3, 2021
This web application is vulnerable to an SQL injection in the login page. We will exploit it to bypass the authentication page and extract the administrator password.
fcsc
intro
web
FCSC 2021 - Intro - Random Search
May 3, 2021
This web application allow us to perform a Stored Cross Site Scripting (XSS) attack. We will use it to retrieve cookies from the administrator and get the flag.
fcsc
forensics
intro
FCSC 2021 - Intro - Rituel du Boutisme
May 3, 2021
In this forensics challenge we need to find a flag in a disk image. We will need to change the endianness to read the flag with strings.
fcsc
forensics
intro
FCSC 2021 - Intro - Rituel en Chaine
May 3, 2021
In this forensics challenge, we need to find a flag in a disk image. To do this, we'll use the powerful strings command.
fcsc
forensics
intro
FCSC 2021 - Intro - Snake
May 3, 2021
This challenge gives us access to a python interpreter and asks us to read the flag.txt. We will read the file, and for fun, open a shell afterwards.
fcsc
intro
python
FCSC 2021 - Intro - Waterfall
May 3, 2021
A flag was hidden in the spectrogram of this signal. We will open the IQ file and display it as a waterfall to get it !
fcsc
intro
radio
HeroCTF 2021 - DevOps Box writeup
April 26, 2021
In this challenge, we will attack a DevOps Box, in various steps. We will exploit a Jenkins server to get a user reverse shell and privilege escalation to root using ansible.
box
devops
heroctf
TTYs and where to find them
April 20, 2021
TTYs and where to find them
shell
spawn
tty
Python format string vulnerabilities
March 24, 2021
Python format strings can be very useful but they can be prone to vulnerabilities when misused.
exploit
format
python
string
Exploiting Micro Focus Enterprise Server Administration (ESA) 1.09.56 to root the host
March 10, 2021
In this article I will demonstrate how to exploit Micro Focus Enterprise Server Administration (ESA) 1.09.56 to create a root account on the host server
exploit
MicroFocus
poc
rce
root
Exploiting CVE-2020-14144 - GiTea Authenticated Remote Code Execution using git hooks
February 17, 2021
The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood.
exploit
GiTea
poc
DVID Writeup 06 - Bluetooth - Characteristics 2
January 25, 2021
This challenge focuses on Bluetooth Low Energy characteristics for IoT devices.
dvid
firmware
iot
DVID Writeup 05 - Bluetooth - Characteristics
January 25, 2021
This challenge focuses on Bluetooth Low Energy characteristics for IoT devices.
dvid
firmware
iot
DVID Writeup 04 - Bluetooth - Advertising
January 25, 2021
This challenge focuses on the advertising phase of Bluetooth Low Energy for IoT devices.
dvid
firmware
iot
DVID Writeup 03 - Firmware - Default password
January 25, 2021
In this challenge, you will learn about the dangers of default passwords in IoT devices
dvid
firmware
iot
DVID Writeup 02 - Firmware - Hardcoded password
January 25, 2021
In this challenge, we will focus on an extremely common vulnerability, default hardcoded passwords
dvid
firmware
iot
DVID Writeup 01 - Hardware - Find the Datasheet
January 25, 2021
In this challenge, you will learn how to burn a firmware and interact with the Damn Vulnerable Iot Device (DVID)
dvid
hardware
iot
Damn Vulnerable IoT Device (DVID) writeup series
January 25, 2021
The Damn Vulnerable IoT Device (DVID) project is aiming to provide a device to experiment with common attacks on the Internet of Things (IoT)
dvid
iot
Reverse Shells 101
December 11, 2020
This article explains the necessary components to create a reverse shell.
reverse-shell
Constructing a semi-interactive reverse shell with curl
November 12, 2020
This article details how I created a curl-based reverse shell, from scratch.
curl
reverse-shell
Constructing a semi-interactive reverse shell with wget
November 11, 2020
This article details how I created a wget-based reverse shell, from scratch.
reverse-shell
wget
CVE-2020-16148 - Telmat - Authenticated root RCE
September 20, 2020
An authenticated code injection on the Administration avancee (Advanced administration) page of Telmat AccessLog, Git@Box and Educ@Box with software version <= 6.0 (TAL_20180415) allows Remote Code Execution (RCE) as root.
authenticated
cve
exploit
rce
root
CVE-2020-16147 - Telmat - Unauthenticated root RCE
September 20, 2020
An unauthenticated code injection on the login page of Telmat AccessLog, Gît@Box and Educ@Box with software version <= 6.0 (TAL_20180415) allows Remote Code Execution (RCE) as root.
cve
exploit
rce
root
unauthenticated
PagedOut Issue 2 : What if - Infinite Malloc
September 1, 2020
What would happen if we tried to allocate an infinite amount of memory ? This is what we will try to discover in this article !
c
infinite
malloc
Why Building an OS/400 Lab at Home Was Harder Than I Expected
January 24, 2020
as400
hardware
ibm
infowindow
keyboard
restoration