Resources
2023
Magazine | Les casiers de livraison Amazon ciblés par une nouvelle arnaque , JT 20h TF1 - Renaud Feil
Magazine | Azure AD et la sécurité, Programmez magazine - Théo Louis-Tisserand, Aymeric Palhière, Arnaud Pilon
2020
Magazine | Popular Chinese-Made Drone Is Found to Have Security Weakness, The New York Times - The Team
Magazine | In-depth security measures of Safari in iOS, MISC Magazine 108 - Fabien Perigaud
Magazine | Classification of browser vulnerabilities, MISC Magazine 108 - Quentin Meffre
Magazine | Source code assessment during Red Teams?, MISC Magazine 108 - Julien Szlamowicz
2019
Magazine | A look inside Raspberry Pi hardware decoders licenses, Paged Out! #2 - Fabien Perigaud
Magazine | Privilege escalation on macOs with CVE-2018-4193, MISC Magazine 106 - Eloi Benoist-Vanderbeken
Magazine | Attacking mobile devices from GPRS to LTE, MISC Magazine HS 19 - Sébastien Dudek
2018
Magazine | Red Team: think like an attacker!, Global Security Mag (page 18) - Renaud Feil
Magazine | Exploitation of a vulnerability in Linux's implementation of the waitid syscall (CVE-2017-5123), MISC Magazine 96 - Thomas Chauchefoin, Julien Egloff
2017
Magazine | Radio communication penetration testing, MISC Magazine HS 16 - Sébastien Dudek
Magazine | Exploiting Django template injections, MISC Magazine 93 - Clément Berthaux
Magazine | Vault 7: analysis of Marble, the CIA code obfuscation framework, MISC Magazine 93 - Thomas Chauchefoin
Magazine | Frida: the swiss-knife of multi-platform dynamic analysis, MISC Magazine 92 - Eloi Benoist-Vanderbeken
2016
Magazine | Bypassing AppLocker using Powershell, MISC Magazine 87 - Damien Picard
Magazine | Attacking a Windows network with Responder, MISC Magazine 85 - Gaetan Ferry
2015
Magazine | Techniques and tools to compromise desktops, MISC Magazine HS 12 - Clément Berthaux
Magazine | Packers and anti-virus, MISC Magazine HS 12 - Eloi Benoist-Vanderbeken
Magazine | Red Team penetration tests: evolution and challenge, MISC Magazine HS 12 - Renaud Feil
Magazine | Discovery and reliable exploitation of an XXE vulnerability in the Drupal Services module, MISC Magazine 80 - Renaud Dubourguais
Magazine | Physical and logical penetration testing, MISC Magazine 80 - Renaud Feil
Magazine | PlugX: analysis of a RAT, MISC Magazine 79 - Fabien Perigaud
Magazine | Crack user data on the Blackphone, 01net - Sébastien Dudek
Magazine | Using reverse engineering skills during a penetration test: practical cases, MISC Magazine 78 - Eloi Benoist-Vanderbeken
Magazine | Using a password cracking tool: John the Ripper, GNU/Linux Magazine HS 76 - Julien Legras
2014
Magazine | Discovery and exploitation of a vulnerability in Windows XP USB stack, MISC Magazine 71 - Fabien Perigaud
2013
Magazine | Pentesting JBoss AS in 2013, MISC Magazine 67 - Renaud Dubourguais
Magazine | MySQL DBMS memory exploitation (CVE-2012-5611), MISC Magazine 67 - Samir Megueddem
2012
Magazine | Applicative security in Linux, MISC Magazine 62 - Sébastien Dudek
Magazine | Android local root: stable exploitation of the CVE-2011-3874 vulnerability, MISC Magazine 61 - Fabien Perigaud
2007
Magazine | Evolution of Cross Site Request Forgery attacks, Journal In Computer Virology - Renaud Feil