I started to learn how computers were working through ezines, some BBS and IRC when I started to have internet access… The full concept of source code / binary was really obscure for me, so I wanted to understand how…
I started to learn how computers were working through ezines, some BBS and IRC when I started to have internet access… The full concept of source code / binary was really obscure for me, so I wanted to understand how…
The original publisher of the hacker manifesto was Phrack, of course at that time it was not shared on a public websites (or was it?) but on obscure BBS. Nevertheless, currently we can read all of them directly from the…
The hacker manifesto is a small essay written by The Mentor in 1986. I have read it quite later but still it gave me goosebumps at that time, I wanted to understand what he went through to write this. I…
FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals On Monday, Oct. 26, KrebsOnSecurity began following up on a tip from a reliable source that an aggressive Russian cybercriminal gang known for deploying ransomware was preparing to…
I have discovered OWASP Juice-shop recently and I found it as a quite interesting tool to train/challenge ourself. Why is that? it is the first “broken tool” I have found with recent technologies (Angular, Node.js …) which will help to…
A new leak from wikileaks expose CIA usage of tools and techniques to spy on citizens.
What I will be writing about in these article speaks about Year 0 release (March 2017).
I have bought an DS409 a few years ago and I felt quite disappointed not to get every update brought by DSM 5 then 6. One easy solution would be to buy a new NAS but, to be honnest, my…
This challenge is linked to a job offer, the article has only been published once the offer has been put offline. Here is the challenge (originally in French): During an Android phone analysis, we have found the following file “secfile.enc”.…