Blog

Cyber Summer School

News

This week we are hosting the Cyber Summer School organized in collaboration with the Cyber Command.

Read
Collaboration agreement between the Cyber Command and the Royal Military Academy

News

On June 26, a collaboration agreement has been signed between the Royal Military Academy and the Cyber Command for research projects within the framework of the DIRS (Defence, Industry and Research Strategy).

Read
Unit testing C code

C Secure Software Development

Writing unit tests is considered a good development habit for numerous reasons. Indeed, unit tests guarantee that the code works as expected, and they prevent developers from accidentally breaking things. Finally, they allow to see how the program is improving with each new commit, and they can be used as documentation to show how the program should be used by others. In this blog post, we show a simple way to implement unit tests when you are writing C code.

Read
RMA and Naval Group team up for Naval Cyber Security

News

Today representatives from the Royal Military Academy, Naval Group, Howest, NVISO and PR0PH3CY signed a partnership agreement to create the Naval Cyber Alliance.

Read
How to detect filtered (and opened) outgoing ports on a network?

Sysadmin Offensive Security

Sometimes you want to access services running on unusual ports, like a SSH server running on port 2222 for example. If connection fails, how can we detect the outgoing ports that are filtered or open on the network?

Read
Cyber Summer School

News

Our colleagues from the Cyber Command of Belgian Defense organize a Cyber Summer School. This training will give you the opportunity to spend five days with our cyber experts and to improve your cyber skills. And of course, they also have social activities planned to occupy your evenings!

Read
Install and use Python on Windows with Anaconda

Python Windows

Today a lot of tools and scripts are written in Python (or in Go, let's be honest). If you want to run these on your Windows computer, well you'll have to install Python. But between the different versions, the libraries, and managing the PATH, the task can be quite of a challenge! In this blog post we show how Anaconda can help...

Read
We are looking for a new colleague!

News Jobs

We are currently hiring a Researcher in Cyberdefense to work on the project Using blockchain to secure the software supply chain.

Read
Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems

Publication Offensive Security

Due to the numerous advantages of machine learning (ML) algorithms, many applications now incorporate them. However, many studies in the field of image classification have shown that MLs can be fooled by a variety of adversarial attacks. This raises many questions in the cybersecurity field, where a growing number of researchers are recently investigating the feasibility of such attacks against machine learning-based security systems, such as intrusion detection systems.

Read
Cyber Security Challenge : Congrats!!

CSC News

Congratulations to the team Royal Military Hackademy who won the Cyber Security Challenge 2023!

Read
SQLMap : additional techniques

Offensive Security Cylab Play

In a previous blog post, we have explained what SQL injection is, and how to exploit it using sqlmap. In this blog post, we will show some additional techniques: how to exploit web applications that use clean URLs, how to exploit a POSTed form, how to hide traces etc.

Read
Cyber Security Challenge : Qualifiers

CSC News

The qualifiers of the Cyber Security Challenge 2023 took place last week-end. Congratulations to the teams from the Royal Military Academy and the Université Libre de Bruxelles who ranked 1st, 4th and 5th, out of almost 300 participating teams!

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept