Nouvelle version majeure de M&NTIS Platform
M&NTIS Platform est une solution SaaS destinée au test d’efficacité de produits de défense (AV, EDR, sondes réseau/NDR, SIEM, XDR, …) et d’architectures de supervision. Une nouvelle version majeure de la plateforme vient de sortir.
A way to find LPE in Windows App
Through this article, we propose a way to find LPE in Windows applications, by using SysInternals tools. What and how to look at? How to exploit in an easy and quick way?
CRY.ME: Private key recovery with a single signature
During the inter-CESTI challenge organized by ANSSI, many vulnerabilities were included to test our abilities to find them and, if possible, to exploit them. In this article, we explore one vulnerability that we found during the original challenge, and explainhow we exploited it: can we find a secret key from a singlesignature?
European Cyber Week 2023 : Challenges & Write ups
Find here the crypto and reverse challenges that our teams created for the European Cyber Week pre-qualification and qualification tests of CTF, a recognized cybersecurity event that took place in Rennes from November 21 to 23, 2023.
SupSec challenge: a blue team CTF by AMOSSYS and Malizen
On the 24th of January, AMOSSYS and Malizen put together a Blue Team CTF, for the SupSec seminar organized by Inria. In this blog post, we explain how we, at AMOSSYS, generated the dataset used in this challenge.
European Cyber Week 2022 Challenges
Find here the crypto and web challenges that our teams created for the European Cyber Week pre-qualification tests of CTF, a recognized cybersecurity event that took place in Rennes from November 15 to 17, 2022.
European Cyber Week 2022 write-ups
Find here the write-ups of the crypto and web challenges that our teams created for the European Cyber Week pre-qualification tests of CTF
CVE-2021-37592 PoC: Eluding Suricata 6.0.3
This article starts with a quick overview on NIDS (Network Intrusion Detection System) evasions to remind what it is and why it could happen.
Retour d’expérience de tests d’intrusion internes
Essor du numérique, diversification des surfaces d’exposition, multiplication des cyberattaques… Depuis plusieurs années, la sécurité informatique est devenue une composante essentielle de l’administration d’un Système d’Information (SI).
Ransomwares : quel mode opératoire en 2020 ?
Depuis plusieurs années, l’écosystème informatique a dû faire face à une recrudescence de compromissions de systèmes d’informations par des rançongiciels, ou cryptolockers, qui s’introduisent principalement par des méthodes automatiques (_spear phishing_, etc.).