Blog

Cyber Security Challenge Belgium 2024

News CSC

Qualifiers for the Cyber Security Challenge 2024 will take place on 8 and 9 March 2024! It's time to register...

Read
Build a kernel, initramfs and Busybox to create your own micro-Linux

Linux Sysadmin

A regular Linux user will probably never have to compile it's own Linux kernel. But doing so is actually a great way to discover the features and working of the Linux kernel. So in this blog post we will guide you to compile a small kernel, create a minimal root filesystem that fits into memory, and finally create a micro-Linux system based on Busybox...

Read
gweb3: a go module to interact with ethereum blockchain

Blockchain Ethereum

Have you ever wonder why most of the web3 tools are written in go (geth, kubo,....) but it's actually difficult to find a go module that would let you interact with the web3 ecosystem like web3.js or web3.py does ? This blog post will introduce you to gweb3, a go module that aims at facilitate the interaction with an Ethereum blockchain from a go program.

Read
Network boot for UEFI devices with iPXE

Sysadmin Linux

In a previous blog post, we have seen how PXE network boot works, and how to implement PXE boot for devices with a (classical) BIOS. For this purpose, we used SYSLINUX/PXELINUX. However, SYSLINUX/PXELINUX is usually not working well with modern UEFI devices. Hence in this blog post, we will show how to use iPXE to implement network boot for UEFI devices.

Read
Understand and implement PXE network boot

Linux Sysadmin

PXE is a powerful system that allows to boot a system from the network. The applications are numerous : install a system from the network, create diskless or kiosk systems. But the system is pretty complex! In this blog post we will explain how network booting works, and show an example to allow interactive installation of Ubuntu 22.04 server from the network...

Read
Create a handler for opening special URLs like 'ssh://'

Linux Sysadmin

Sometimes when using a web application you may encounter a special URL that does not start with http or https, like ssh://192.168.0.123 for example. On a mobile device, your phone will usually open the appropriate application to handle this URL. Here is how to achieve the same on a Linux computer.

Read
The P4 language - Overview of P4 programming

P4

This second blog post gives an overview of P4 programming by illustrating some of the key concepts found in most P4 programs, from header declaration to packets deparsing.

Read
The MARK python client

MARk Python

We have released version 2.0.0 of our Multi-Agent Ranking Framework Python client!

Read
The P4 language - The basics of P4 language

P4

Programming Protocol-independent Packet Processors (P4) is a domain-specific language for network devices, specifying how data plane devices (switches, NICs, routers, filters, etc.) process packets. P4 programs are designed to be implementation-independent: they can be compiled against many different types of execution machines such as general-purpose CPUs, FPGAs, system(s)-on-chip, network processors, and ASICs.

Read
Velociraptor : hunt malwares as a pack

Forensics Sysadmin Linux

Velociraptor is a digital forensic and incident response tool that allows to collect information on multiple endpoints at once, and easily analyze the collected data using Notebooks and a query language (called Velociraptor Query Language, VQL), which is very similar to SQL. This makes Velociraptor a valuable tool for threat hunting over a large network.

Read
Explore the SAM hive with Regedit (and Sysinternals)

Windows Sysadmin Forensics

The Windows Registry is a kind of database that stores a lot of important configuration parameters for Windows and installed applications. The specific of this database is that the data is actually stored in different files called hives. One of these is the SAM (Security Account Manager) hive, which stores, among others, user passwords. Let's explore this hive a little..

Read
Install Sysinternals

Windows Sysadmin Forensics

Sysinternals is a collection of powerful utilities for Windows. They can be used by system administrators to perform local or remote system administration, and also by analysts to perform some forensics tasks. The tools were originally developed by Mark Russinovich, and are now maintained by Microsoft. Here is how to install them...

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept