Thibault Debatty

Man-In-The-Middle (MITM) with arpspoof

In this post we show how to easily perform a L2 man-in-the-middle attack using arpspoof on a standard Ubuntu computer...

Read
Mobile Device Security Training

On Wednesday 15 April 2020, we are organizing a special training session dedicated to Mobile Devices Security.

Read
Cyber Range release 0.0.22

Today we released version 0.0.22 of our Cyber Range tool.

Read
Stealthy website scanning thanks to archive.org

Scanning a website is an important step of the reconnaissance phase. Different tools, like BlackWidow, can automate the process. We present here another tool that allows to scan a website without leaving traces on the target servers : waybackurls.

Read
Laravel : Quickstart

Laravel is an extremely powerful PHP framework for building web applications, but the first steps can be quite intimidating. In this tutorial we guide you through the first steps to get you started as a breeze.

Read
Static code analysis in PHP (and GitLab)

In the PHP toolbox for testing, you'll often find phpunit for unit testing, PHP_CodeSniffer for code style analysis, and here we present PHPStan for static code analysis.

Read
Information gathering with BlackWidow

BlackWidow is a python script that automatically crawls a website to gather information like phone numbers, email addresses, form URL's etc. Very useful during the reconnaissance phase!

Read
MARK release 0.0.28

Today we released version 0.0.28 of our Multi-Agent Ranking Framework (MARK).

Read
Manage VirtualBox with PHP

phpVirtualBox is a well known web interface for managing virtual machines. There is however another less known library that allows to manage virtual machines from your own PHP applications : php-vbox-api. The API allows you to do stuff like:

Read
Understanding Laravel middleware : admin users

In Laravel, a Middleware is basically a piece of code that should be executed for every http request. Middlewares are typically used to:

Read
Distributed k-nn graphs and similarity search

Today we are presenting distributed k nearest neighbors (k-nn) graphs and similarity search algorithms at the ULB.

Read
Modify your static IP on Ubuntu server

This seems easy, but... When you modify your static IP address in /etc/network/interfaces, the old IP is not removed. The new IP is simply added to your interface.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept