Skip to content

Commit 43be6c2

Browse files
committed
SEO cards for all posts
1 parent 1696af7 commit 43be6c2

15 files changed

+15
-2
lines changed

_posts/2017-11-8-FrenchCroissant.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: French Croissant - or why you need to lock your computer
4+
image: /images/default.jpg
45
---
56

67
Last year the first day of my internship I was given a computer and asked to install and secure it for two days. After that delay anyone can try to attack and compromise my machine, and if so I was welcome to buy some "French Croissants" to the team while the attacker explain his method to get access into your computer the next morning.

_posts/2018-1-18-WhidInjector.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: WHID Injector - Tips and Tricks
4+
image: /images/default.jpg
45
---
56

67
What is it ? The WHID Injector is USB Key which act as a remote keyboard. Basically it sets up a Wifi Access Point where you can connect and send whatever you want on the machine. It also has a Rubber Ducky payload converter, an exfiltrated data tab and many more.

_posts/2018-12-23-SIGSEGV-MD_AUTH.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: SIGSEGV1 Writeup - MD Auth
4+
image: /images/default.jpg
45
---
56

67
Let's talk about the "MD Auth" challenge, I admit I started with this challenge thinking it would be about "Markdown". I was wrong but it was nonetheless interesting to solve.

_posts/2018-8-14-An-XSS-Story.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: An XSS Story
4+
image: /images/default.jpg
45
---
56

67
Last night I stumbled across an XSS in a bug bounty program, this was quite fun to exploit.

_posts/2019-11-26-SeaMonsterCTF.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: UYBHYS - Sea Monster Attack & Defense CTF
4+
image: /images/SeaMonster/SeaMonsterBanner.png
45
---
56

67
Last week-end I teamed up with members from [Aperikube](https://www.aperikube.fr) for an Attack/Defense CTF which took place in Brest - France. In this "small" blog post I will write about this experience, the challenges and our methodology :)

_posts/2019-12-14-Ph0wn-CTF.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: Ph0wn CTF 2019 - Smart Devices CTF
4+
image: /images/Ph0wn/Ph0wnBanner.png
45
---
56

67
Another week another CTF, this time it was the [Ph0wn](https://ph0wn.org) at Sophia Antipolis (France). I teamed up with members from [@Maki](https://twitter.com/maki_mitz), [@iansus](https://twitter.com/iansus), [@MansourCyril](https://twitter.com/MansourCyril) and [@0hax](https://twitter.com/0hax2). We reached the **second place** of this IoT/Hardware CTF.

_posts/2019-12-26-DVID.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: DVID - Damn Vulnerable IoT Device
4+
image: /images/DVID/bleadvertising.jpg
45
---
56

67
Who ever wanted to learn about Hardware Hacking ? I found this small opensource **IoT hacking** learning board while I was in a security event. It is designed by [@vulcainreo](https://twitter.com/vulcainreo/) and cost around 45€, more than 300 units were shipped around the world.

_posts/2019-6-22-HIP19-MeetYourDoctor.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: HIP19 Writeup - Meet Your Doctor 1,2,3
4+
image: /images/HIP19/hip19_wargame.png
45
---
56

67
Last wednesday I was in the Hack In Paris event for the 3rd time. As always there were some great conferences and challenges, and a new competition called "Hacker Jeopardy" which was very fun! During the Wargame I focused my time on Web challenges based on the `graphql` technology which was new to me, you will find below my writeups for the `Meet Your Doctor` challenges.

_posts/2020-04-26-FCSC.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
layout: post
33
title: FCSC - CTF Writeup
4+
image: /images/FCSC/2020-fcsc-logo.jpg
45
---
56

67
## FCSC - FRANCE CYBERSECURITY CHALLENGE 2020
78

89
Some writeups of severals web challenges from the [FCSC 2020](https://france-cybersecurity-challenge.fr).
910

10-
11-
![https://www.ssi.gouv.fr/uploads/2020/03/2020-fcsc-logo.jpg](https://www.ssi.gouv.fr/uploads/2020/03/2020-fcsc-logo.jpg)
11+
![https://www.ssi.gouv.fr/uploads/2020/03/2020-fcsc-logo.jpg](/images/FCSC/2020-fcsc-logo.jpg)
1212

1313
## Challenges' Writeup
1414

_posts/2022-05-21-STHACK2022.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
layout: post
33
title: STHACK2022 - Catch the bird, a trip from web to IRL
4+
image: /images/STHACK2022/sthack2022_post-card.png
45
---
56

67
* Challenge author: ajani

0 commit comments

Comments
 (0)