Blog

Implement a Java detector for the Multi-Agent Ranking framework

MARk Java

In previous blog posts we showed how to inject a stream of data in the Multi-Agent Ranking framework, and how to use the built-in detectors to produce a ranking. This time we show how to implement your own detection algorithms.

Read
Continuous Deployment with GitLab and Kubernetes

GitLab Kubernetes

If you have a web application, with the appropriate Dockerfile, you can now go the next step and use GitLab to automatically deploy your application to a kubernetes cluster. Here is how...

Read
OSINT - Simple tips #2 - Facebook

OSINT

This second blog post on the OSINT field will talk about Facebook. Again, it is a really simple tip but very interesting.

Read
Installing Linux Bash Shell (and Metasploit) on Windows 10

Windows Linux Forensics

For years, there has been an OS war between Linux, Windows and macOS for dominance. Each side would vehemently defend their OS of choice and disregard any positive sides of their "opponents". Of course, each operating system has its benefits and drawbacks and it is not my job or place to say which is the best.

Read
OSINT - Simple tips #1 - Linkedin

OSINT

OSINT, for Open Source INTelligence, is the process of searching for, gathering and analyzing data found from public sources. The data are accessible without breaking into any systems (hacking, phishing, etc.). Sometimes, data are behind a paywall (it is necessary to pay a monthly subscription to have access to some specific data) but a lot are easily accessible with the right tricks.

Read
MARk : Use built-in detectors

MARk

Now that you have a running MARk server, with data flowing in, you can use the provided algorithms to build your detection chain.

Read
Getting started with MARk : create a PHP data injector

MARk PHP

The Multi-Agent Ranking framework (MARk) aims to provide all the building blocks that are required to build large scale detection and ranking systems. For this blog post we will use docker and docker-compose to run a MARk server, then we will use PHP and composer to inject data in the framework.

Read
Multi-Agent Ranking framework version 2 is out

MARk

This week we released a new major version of the Multi-Agent Ranking framework (MARk). This version brings two main changes:

Read
Email (in)security

Offensive Security

Sending emails relies mainly on SMTP, the Simple Mail Transfert Protocol. This protocol is actually quite old: the first traces date back from the 70's, and the first standardisation took place in 1982 (RFC 821). It is primarily a very simple and insecure protocol, although multiple additional protocols have developed to protect emails and avoid SPAM. In this blog post we review these different protection mechanisms.

Read
Password guessing with Hydra

Pentesting

A password is like a "key" used to open a specific door or vault. In this vault, there can be different personal documents, pictures, banking information... It is obvious that a user wants its personal documents secure. If the "key", therefore the password, is easy to find, the vault can be as strong as you want, it will be easy to open it.

Read
Install Volatility on Debian, Ubuntu & Mint

Sysadmin Forensics

In this blog post we show how to install the latest (GIT) version of Volatility memory forensics framework on Debian, Ubuntu or Mint.

Read
Compute code coverage for a multi-module maven project with Jacoco

Java

In a previous blog post, we showed how to use Jacoco to check the code coverage of your tests in a maven Java project. If your project is substantial, you will have multiple maven modules. So how can we compute the global code coverage?

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept