Blog

Sending SMS with a USB GSM modem (and Python)

SMS Phishing Python Cyber-Wise

Despite its occasional unreliability as seen here and there, SMS remains a common communication method. Before diving into Python, understanding AT commands is a good start for interfacing with a USB GSM modem. This concise guide lays out the steps to integrate SMS functionality into your projects, enabling you to utilize the power of SMS communication with ease.

Read
Solidity: ABI encoding explained

Blockchain Ethereum Smart Contract

If you have already been curious about how Ethereum smart contract works under the hood or even participated to a CTF where you had to exploit some weakness in smart contract, you probably stumble upon the solidity abi encoding page. Even if this is the reference paper, it can look a bit difficult to understand and it's not easily readable even though it's not really difficult. Let's review how the encoding is working with the help of few example.

Read
Add modules to your micro-Linux

Linux Sysadmin

In a previous blog post, we have built a micro-Linux system relying on initramfs. In this blog post, we will add modules to this minimal system.

Read
GitLab : fix "cgroups: cgroup mountpoint does not exist: unknown"

GitLab Sysadmin Docker

If you use GitLab pipelines to build Docker image, you may encounter the error "cgroups: cgroup mountpoint does not exist: unknown". Here is how to fix...

Read
Benchmark Linux systems with sysbench

Linux Sysadmin

In this blog post, I will show how to use sysbench to test the CPU, memory and storage performance of a Linux system. I also had the chance to access some diverse hardware (laptop, desktop, servers). So I'll also give some results for you to compare with.

Read
Use phpunit to test your PHP project

PHP GitLab

So you are developing some PHP code? Beter make sure it works as expected! In this blog post we will show how to quickly get started with phpunit to automatically test your code...

Read
Are SMS messages vulnerable in 5G ?

SS7 Phishing

This blog discusses the security of SMS in the context of 5G. In a preceding blog (https://cylab.be/blog/171/sms-based-2-factor-authentication-is-insecure), we already addressed the issue of SMS interception in 2G/3G networks and its potential consequences for 2-Factor Authentication. Here, we analyze the situation within the 5G ecosystem.

Read
Cyber Awareness Game

News

On the occasion of the Open Day of the Royal Military Academy, we are organizing a Cyber Awareness Game.

Read
Cyber Security Challenge Belgium 2024

News CSC

Qualifiers for the Cyber Security Challenge 2024 will take place on 8 and 9 March 2024! It's time to register...

Read
Build a kernel, initramfs and Busybox to create your own micro-Linux

Linux Sysadmin

A regular Linux user will probably never have to compile it's own Linux kernel. But doing so is actually a great way to discover the features and working of the Linux kernel. So in this blog post we will guide you to compile a small kernel, create a minimal root filesystem that fits into memory, and finally create a micro-Linux system based on Busybox...

Read
gweb3: a go module to interact with ethereum blockchain

Blockchain Ethereum

Have you ever wonder why most of the web3 tools are written in go (geth, kubo,....) but it's actually difficult to find a go module that would let you interact with the web3 ecosystem like web3.js or web3.py does ? This blog post will introduce you to gweb3, a go module that aims at facilitate the interaction with an Ethereum blockchain from a go program.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept