Blog

Analyse of a crypto scam

Blockchain Ethereum

If you ever connected to a discord server related to ethereum (geth, ethereum.org) you probably noticed that despite very useful information given about the technology, those server are also unfortunately full of scammer... Let's have a look at one of them and analyse the scam it propose.

Read
Standalone Security Onion, a perfect SIEM solution for small networks

Sysadmin Network analysis and visualization Linux Monitoring SIEM

Security Onion is a free and open platform built by defenders for defenders. It includes network visibility, host visibility, intrusion detection honeypots, log management, and case management.

Read
Use docker-compose to create a dev environment for Laravel 6, 7 and 8

Laravel Docker PHP

Setting up a Laravel environment requires to install and configure multiple components: the correct PHP version, of course, but also a database, node server, probably queue worker and scheduler. To get you quickly started, here is how to deploy a dev environment for Laravel with docker compose.

Read
Sending SMS with a USB GSM modem (and Python)

SMS Phishing Python Cyber-Wise

Despite its occasional unreliability as seen here and there, SMS remains a common communication method. Before diving into Python, understanding AT commands is a good start for interfacing with a USB GSM modem. This concise guide lays out the steps to integrate SMS functionality into your projects, enabling you to utilize the power of SMS communication with ease.

Read
Solidity: ABI encoding explained

Blockchain Ethereum Smart Contract

If you have already been curious about how Ethereum smart contract works under the hood or even participated to a CTF where you had to exploit some weakness in smart contract, you probably stumble upon the solidity abi encoding page. Even if this is the reference paper, it can look a bit difficult to understand and it's not easily readable even though it's not really difficult. Let's review how the encoding is working with the help of few example.

Read
Add modules to your micro-Linux

Linux Sysadmin

In a previous blog post, we have built a micro-Linux system relying on initramfs. In this blog post, we will add modules to this minimal system.

Read
GitLab : fix "cgroups: cgroup mountpoint does not exist: unknown"

GitLab Sysadmin Docker

If you use GitLab pipelines to build Docker image, you may encounter the error "cgroups: cgroup mountpoint does not exist: unknown". Here is how to fix...

Read
Benchmark Linux systems with sysbench

Linux Sysadmin

In this blog post, I will show how to use sysbench to test the CPU, memory and storage performance of a Linux system. I also had the chance to access some diverse hardware (laptop, desktop, servers). So I'll also give some results for you to compare with.

Read
Use phpunit to test your PHP project

PHP GitLab

So you are developing some PHP code? Beter make sure it works as expected! In this blog post we will show how to quickly get started with phpunit to automatically test your code...

Read
Are SMS messages vulnerable in 5G ?

SS7 Phishing

This blog discusses the security of SMS in the context of 5G. In a preceding blog (https://cylab.be/blog/171/sms-based-2-factor-authentication-is-insecure), we already addressed the issue of SMS interception in 2G/3G networks and its potential consequences for 2-Factor Authentication. Here, we analyze the situation within the 5G ecosystem.

Read
Cyber Awareness Game

News

On the occasion of the Open Day of the Royal Military Academy, we are organizing a Cyber Awareness Game.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept