Ressources
2023
Revue | Les casiers de livraison Amazon ciblés par une nouvelle arnaque , JT 20h TF1 - Renaud Feil
Revue | Azure AD et la sécurité, Programmez magazine - Théo Louis-Tisserand, Aymeric Palhière, Arnaud Pilon
2021
Revue | Comment les spécialistes de l’intrusion percent les coffres-forts numériques, Article de journal - The Team
2020
Revue | Popular Chinese-Made Drone Is Found to Have Security Weakness, The New York Times - The Team
Revue | In-depth security measures of Safari in iOS, MISC Magazine 108 - Fabien Perigaud
Revue | Classification of browser vulnerabilities, MISC Magazine 108 - Quentin Meffre
Revue | Source code assessment during Red Teams?, MISC Magazine 108 - Julien Szlamowicz
2019
Revue | A look inside Raspberry Pi hardware decoders licenses, Paged Out! #2 - Fabien Perigaud
Revue | Privilege escalation on macOs with CVE-2018-4193, MISC Magazine 106 - Eloi Benoist-Vanderbeken
Revue | Attacking mobile devices from GPRS to LTE, MISC Magazine HS 19 - Sébastien Dudek
2018
Revue | Red Team: think like an attacker!, Global Security Mag (page 18) - Renaud Feil
Revue | Exploitation of a vulnerability in Linux's implementation of the waitid syscall (CVE-2017-5123), MISC Magazine 96 - Thomas Chauchefoin, Julien Egloff
2017
Revue | Radio communication penetration testing, MISC Magazine HS 16 - Sébastien Dudek
Revue | Exploiting Django template injections, MISC Magazine 93 - Clément Berthaux
Revue | Vault 7: analysis of Marble, the CIA code obfuscation framework, MISC Magazine 93 - Thomas Chauchefoin
Revue | Frida: the swiss-knife of multi-platform dynamic analysis, MISC Magazine 92 - Eloi Benoist-Vanderbeken
2016
Revue | Bypassing AppLocker using Powershell, MISC Magazine 87 - Damien Picard
Revue | Attacking a Windows network with Responder, MISC Magazine 85 - Gaetan Ferry
2015
Revue | Red Team penetration tests: evolution and challenge, MISC Magazine HS 12 - Renaud Feil
Revue | Techniques and tools to compromise desktops, MISC Magazine HS 12 - Clément Berthaux
Revue | Packers and anti-virus, MISC Magazine HS 12 - Eloi Benoist-Vanderbeken
Revue | Discovery and reliable exploitation of an XXE vulnerability in the Drupal Services module, MISC Magazine 80 - Renaud Dubourguais
Revue | Physical and logical penetration testing, MISC Magazine 80 - Renaud Feil
Revue | PlugX: analysis of a RAT, MISC Magazine 79 - Fabien Perigaud
Revue | Crack user data on the Blackphone, 01net - Sébastien Dudek
Revue | Using reverse engineering skills during a penetration test: practical cases, MISC Magazine 78 - Eloi Benoist-Vanderbeken
Revue | Using a password cracking tool: John the Ripper, GNU/Linux Magazine HS 76 - Julien Legras
2014
Revue | Discovery and exploitation of a vulnerability in Windows XP USB stack, MISC Magazine 71 - Fabien Perigaud
2013
Revue | Pentesting JBoss AS in 2013, MISC Magazine 67 - Renaud Dubourguais
Revue | MySQL DBMS memory exploitation (CVE-2012-5611), MISC Magazine 67 - Samir Megueddem
2012
Revue | Applicative security in Linux, MISC Magazine 62 - Sébastien Dudek
Revue | Android local root: stable exploitation of the CVE-2011-3874 vulnerability, MISC Magazine 61 - Fabien Perigaud
2007
Revue | Evolution of Cross Site Request Forgery attacks, Journal In Computer Virology - Renaud Feil