Blog

Simulate user activity with the GHOSTS framework : Introduction

Offensive Security

When we want to test some detection algorithm we are developing, or we want to prepare a nice in-depth exercise for our students, we need to set up an ecosystem that closely resembles that of the real world. This can lead to some difficulties as in a real network we have multiple users, each with the own computer, surfing the net, working with files, or typing commands and sending requests to the network's centralized server. It could pose a big challenge to model this if we don't have a group of people available who we can task with sitting behind a computer and clicking on their mouse every so often to simulate real computer behaviour. There are tools available that help automate that, but in most cases they can be quite rudimentary.

Read
Implement CRUD operations in Laravel, and automatic code generation

Laravel PHP

When working with model objects in Laravel, you will typically have to implement the CRUD operations: Create, Read, Update and Delete objects from the database. To support these operations you will need to write:

Read
Man-In-The-Middle (MITM) with arpspoof

Offensive Security

In this post we show how to easily perform a L2 man-in-the-middle attack using arpspoof on a standard Ubuntu computer...

Read
Mobile Device Security Training

Training Stay Home Offensive Security Mobile Device Security

On Wednesday 15 April 2020, we are organizing a special training session dedicated to Mobile Devices Security.

Read
Decompile and modify an Android application

Mobile Device Security Secure Software Development

Usually, Android applications are written in Java (or, now, in Javascript) and compiled in a Dalvik bytecode (DEX file). Then, the bytecode is interpreted and executed by the Dalvik Virtual Machine.

Read
Cyber Range release 0.0.22

Cyrange Cyber Range

Today we released version 0.0.22 of our Cyber Range tool.

Read
Stealthy website scanning thanks to archive.org

Offensive Security

Scanning a website is an important step of the reconnaissance phase. Different tools, like BlackWidow, can automate the process. We present here another tool that allows to scan a website without leaving traces on the target servers : waybackurls.

Read
Laravel : Quickstart

Laravel PHP

Laravel is an extremely powerful PHP framework for building web applications, but the first steps can be quite intimidating. In this tutorial we guide you through the first steps to get you started as a breeze.

Read
Find secret API token in Android application

Offensive Security Mobile Device Security

In May 2019, Google announced there are 2.5 billion active Android devices. Thereby, most companies develop their own application. Not only the richest companies like Google, Facebook, Amazon,... but also a lot of smaller businesses.

Read
Static code analysis in PHP (and GitLab)

PHP GitLab Secure Software Development

In the PHP toolbox for testing, you'll often find phpunit for unit testing, PHP_CodeSniffer for code style analysis, and here we present PHPStan for static code analysis.

Read
Information gathering with BlackWidow

Offensive Security

BlackWidow is a python script that automatically crawls a website to gather information like phone numbers, email addresses, form URL's etc. Very useful during the reconnaissance phase!

Read
MARK release 0.0.28

MARk

Today we released version 0.0.28 of our Multi-Agent Ranking Framework (MARK).

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept