• Agréé CESTI
  • Qualifié PASSI
  • Rejoins-nous
  • CONTACT
Centre d'expertises en cybersécurité
  • EXPERTISES
    • Audits de sécurité
    • Conseil & gouvernance
    • Certification CSPN
    • Certification de sécurité
  • PUBLICATIONS
    • Articles techniques
    • Exploit & Vuln
  • A PROPOS
    • Qui sommes-nous
    • CESTI agrément
    • Qualification PASSI
Sélectionner une page
Data Perimeter – Segregating AWS accounts and data

Data Perimeter – Segregating AWS accounts and data

par Alexandre RIPOTEAU | Juin 18, 2025 | Articles techniques EN

In large AWS environments, resources and users are sometimes segmented into units within an organization. This allows access and usage to be segregated. However, it is difficult to effectively control all resources at the organizational level. Data perimeter allows...
eBPF in practice – PID concealment (Part 2)

eBPF in practice – PID concealment (Part 2)

par Tristan D'audibert | Août 28, 2024 | Articles techniques EN, Développement, Outils et méthodes

This article is a tutorial on how to create an eBPF program using a tracepoint. If you are not familiar with eBPF, please refer to our introduction to eBPF, or to the official documentation. To follow this article in the best conditions, we recommend you read part 1...
How to crack encrypted SSH private keys?

How to crack encrypted SSH private keys?

par Alexandre Zanni | Juil 18, 2024 | Articles techniques EN, Non classifié(e)

This article will look at various techniques for breaking SSH private keys. An unencrypted private key can be used by anyone with access to the file. An encrypted key, on the other hand, can only be used by those who know the password needed to decrypt the key. Thus,...
CSRF GET + SameSite – Concrete attack

CSRF GET + SameSite – Concrete attack

par Alexandre RIPOTEAU | Juil 5, 2024 | Articles techniques EN, Non classifié(e)

In order to prevent CSRF (Cross-Site Request Forgery) attacks, security best practices such as those of OWASP recommend the use of a synchronization token model or anti-CSRF token. The absence of a token does not necessarily lead to vulnerability, and several factors...
A look back at Insomni’hack 2024

A look back at Insomni’hack 2024

par Arthur DELOFFRE | Mai 15, 2024 | Actualité EN, Articles techniques EN, Non classifié(e)

Insomni’hack is a cybersecurity conference founded and organized by SCRT S.A. (now Orange Cyberdefense Switzerland) since 2008. It takes place in Switzerland, and lasts a week for each edition. This year, it took place from April 22 to 26, 2024 at the SwissTech...
eBPF in practice – PID concealment (Part 2)

eBPF program creation in practice – PID concealment (Part 1)

par Tristan D'audibert | Fév 7, 2024 | Articles techniques EN, Développement, Outils et méthodes

This article is a tutorial on how to create an eBPF program using a tracepoint. If you’re not familiar with eBPF, you can refer to our introduction to eBPF, or to the official documentation What is a tracepoint? How do I create one with eBPF? What are the steps...
Introduction to eBPF

Introduction to eBPF

par Tristan D'audibert | Jan 30, 2024 | Articles techniques EN, Développement, Outils et méthodes

Are you familiar with eBPF ? Do you know its purpose or how it works ? Today, I’m trying to outline a brief overview of what, for me, is a revolutionary and very promising technology for the future of computing. eBPF is a revolutionary technology with origins in...
Theft of NTLM v2 hash code via Outlook vulnerability (CVE-2023-35636)

Theft of NTLM v2 hash code via Outlook vulnerability (CVE-2023-35636)

par Alexandre Zanni | Jan 25, 2024 | Articles techniques EN

Introduction Varonis Threat Labs has discovered a new Outlook vulnerability (CVE-2023-35636) among three new ways to access NTLM v2 hash codes by exploiting Outlook, Windows Performance Analyzer (WPA) and Windows File Explorer. With access to these hash codes,...
Tackling PXE images

Tackling PXE images

par Alexandre Zanni | Jan 8, 2024 | Actualité, Articles techniques EN, Outils et méthodes

In this article, we’ll demystify the nuts and bolts of PXE boot, and explain how to retrieve and analyze a PXE image to find secrets (such as an AD domain account). Note: This article is also available in french 🇫🇷. What is PXE? 🔍 In...

LDAP pass back attack

par Alexandre Zanni | Nov 30, 2023 | Articles techniques EN, Outils et méthodes

This article describes the methodology for Active Directory domain accounts takeover through LDAP pass back attack on printers. Note: This article is also available in french 🇫🇷. Goal 🥅 In the context of an internal infrastructure penetration...

VS Code – Trust abuse

par Alexandre RIPOTEAU | Sep 29, 2023 | Articles techniques EN, Outils et méthodes

Visual Studio Code is, according to a Stack Overflow survey, the most popular IDE, and has been the subject of security research and possible compromise. This article succinctly details the research done by others on this IDE, presents the IDE’s trust model, and...

Kirby < 3.9.6 XML External Entity (XXE) vulnerability — CVE-2023-38490

par Alexandre Zanni | Sep 6, 2023 | Articles techniques EN

Note: This article is also available in french 🇫🇷. Introduction Kirby is a Nitendo video game character open-source PHP CMS oriented for creators and designers. The vulnerability presented in this article is an XML External Entity (XXE) in...

Solution for the vulnerable code snippet n°7

par Alexandre Zanni | Sep 4, 2023 | Articles techniques EN, Challenges

The vulnerability to be detected for this challenge was a local file disclosure due to incorrect path limitation. Solving the challenge doesn’t require any special knowledge, just reading the Actix web framework documentation to understand how the methods...

Solution for the vulnerable code snippet n°6

par Alexandre Zanni | Juil 24, 2023 | Articles techniques EN, Challenges

The vulnerability to be detected for this challenge was a resource (variable) injection that enabled authentication to be bypassed. Solving the challenge requires knowledge of certain PHP functions. Note: This article is also available in french 🇫🇷....

Solution for the vulnerable code snippet n°5

par Alexandre Zanni | Juin 26, 2023 | Articles techniques EN, Challenges

The vulnerability to detect for this challenge was an SSRF exploitable with a workaround using a DNS rebinding (TOCTOU). The challenge resolution does not necessarily require knowledge of the language (Ruby) or the web framework (Roda). Indeed, the problem being...
« Entrées précédentes

Catégories

  • Actualité
  • Actualité EN
  • Articles techniques
  • Articles techniques EN
  • Challenges
  • Cryptologie
  • Développement
  • Intelligence économique / OSINT
  • La cyber à la une
  • Non classifié(e)
  • Outils et méthodes
  • Outils et méthodes EN
  • Reverse

Étiquettes

attaque code-snippet cookie crack cryptographie ctf cve cybersécurité DDOS domotique ebpf fuzzing graphql hardening hashcat john kernel ldap linux méthodologie news noyau open-redirect outils outlook pentest phishing pxe ransomware rce reverse rust scénario solarwinds sous-domaine ssh systemd unicode VPN vulnérabilité web write-up XSS xxe zip

Ils nous font confiance

La cybersécurité est l’affaire de tous, c’est pourquoi nous poussons notre expertise dans différents domaines :

Santé – Agri-Agro – Armée défense – Industrie – Edition Logiciel

Experts en cybersécurité Paris Rennes
  • Qui sommes-nous ?
  • Blog / Publications
  • Rejoins-nous !
  • Contactez-nous
  • Plan du site
  • Pentest / Test d’intrusion
  • Audits de cybersécurité
  • Certification CSPN
  • Conseil en cybersécurité
  • Certification de services
  • Gouvernance de la sécurité
  • Sensibilisation et formations

Centre d’expertises en cybersécurité à :
RENNES – 12 rue du Bourg Nouveau – 35000 RENNES
PARIS – 140 bis rue de Rennes – 75006 PARIS

Suivez-nous

Linkedin ACCEIS cybersécurité Twitter ACCEIS cybersécurité Github ACCEIS cybersécurité

Cybersécurité interventions Rennes Paris Tous concernés par la cybersécurité, nous vous proposons des interventions dans vos réseaux, webinaires, regroupement… Contactez-nous !

Experts en cybersécurité Paris Rennes
  • Qui sommes-nous ?
  • Blog / Publications
  • Rejoins-nous !
  • Contactez-nous
  • Plan du site
  • Pentest / Test d’intrusion
  • Audits de cybersécurité
  • Certification CSPN
  • Conseil en cybersécurité
  • Certification de services
  • Gouvernance de la sécurité
  • Sensibilisation et formations

Cybersécurité interventions Rennes Paris Tous concernés par la cybersécurité, nous vous proposons des interventions dans vos réseaux, webinaires, regroupement… Contactez-nous !

Centre d’expertises en cybersécurité à :
RENNES – 12 rue du Bourg Nouveau – 35000 RENNES
PARIS – 140 bis rue de Rennes – 75006 PARIS

Suivez-nous

Linkedin ACCEIS cybersécurité Twitter ACCEIS cybersécurité Github ACCEIS cybersécurité