Ressources
2021
Revue | Comment les spécialistes de l’intrusion percent les coffres-forts numériques , Article de journal - The Team
2020
Revue | Popular Chinese-Made Drone Is Found to Have Security Weakness , The New York Times - The Team
Revue | In-depth security measures of Safari in iOS , MISC Magazine 108 - Fabien Perigaud
Revue | Classification of browser vulnerabilities , MISC Magazine 108 - Quentin Meffre
Revue | Source code assessment during Red Teams? , MISC Magazine 108 - Julien Szlamowicz
2019
Revue | A look inside Raspberry Pi hardware decoders licenses , Paged Out! #2 - Fabien Perigaud
Revue | Privilege escalation on macOs with CVE-2018-4193 , MISC Magazine 106 - Eloi Benoist-Vanderbeken
Revue | Attacking mobile devices from GPRS to LTE , MISC Magazine HS 19 - Sébastien Dudek
2018
Revue | Red Team: think like an attacker! , Global Security Mag (page 18) - Renaud Feil
Revue | Exploitation of a vulnerability in Linux's implementation of the waitid syscall (CVE-2017-5123) , MISC Magazine 96 - Thomas Chauchefoin , Julien Egloff
2017
Revue | Radio communication penetration testing , MISC Magazine HS 16 - Sébastien Dudek
Revue | Exploiting Django template injections , MISC Magazine 93 - Clément Berthaux
Revue | Vault 7: analysis of Marble, the CIA code obfuscation framework , MISC Magazine 93 - Thomas Chauchefoin
Revue | Frida: the swiss-knife of multi-platform dynamic analysis , MISC Magazine 92 - Eloi Benoist-Vanderbeken
2016
Revue | Bypassing AppLocker using Powershell , MISC Magazine 87 - Damien Picard
Revue | Attacking a Windows network with Responder , MISC Magazine 85 - Gaetan Ferry
2015
Revue | Red Team penetration tests: evolution and challenge , MISC Magazine HS 12 - Renaud Feil
Revue | Techniques and tools to compromise desktops , MISC Magazine HS 12 - Clément Berthaux
Revue | Packers and anti-virus , MISC Magazine HS 12 - Eloi Benoist-Vanderbeken
Revue | Discovery and reliable exploitation of an XXE vulnerability in the Drupal Services module , MISC Magazine 80 - Renaud Dubourguais
Revue | Physical and logical penetration testing , MISC Magazine 80 - Renaud Feil
Revue | PlugX: analysis of a RAT , MISC Magazine 79 - Fabien Perigaud
Revue | Crack user data on the Blackphone , 01net - Sébastien Dudek
Revue | Using reverse engineering skills during a penetration test: practical cases , MISC Magazine 78 - Eloi Benoist-Vanderbeken
Revue | Using a password cracking tool: John the Ripper , GNU/Linux Magazine HS 76 - Julien Legras
2014
Revue | Discovery and exploitation of a vulnerability in Windows XP USB stack , MISC Magazine 71 - Fabien Perigaud
2013
Revue | Pentesting JBoss AS in 2013 , MISC Magazine 67 - Renaud Dubourguais
Revue | MySQL DBMS memory exploitation (CVE-2012-5611) , MISC Magazine 67 - Samir Megueddem
2012
Revue | Applicative security in Linux , MISC Magazine 62 - Sébastien Dudek
Revue | Android local root: stable exploitation of the CVE-2011-3874 vulnerability , MISC Magazine 61 - Fabien Perigaud
2007
Revue | Evolution of Cross Site Request Forgery attacks , Journal In Computer Virology - Renaud Feil