How to resolve HTB Bounty
In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...
LibSSH New Vulnerability
New vulnerability on libssh CVE-2018-10933
Here, we will explain a vulnerability that allows a remote attacker to bypass authentication by...
How to resolve HTB DevOops
In this article, we present how to exploit the vulnerabilities of DevOops, a Linux Hack the Box...
Are You Checking Types?
Static type checking with mypy
What are the potential problems of untyped objects in Python? Here we work on the importance of...
Road to Functional Python
Functional coding in Python
Here is an intro to the essential aspects of functional programming in Python, its benefits, how...
Why We Go Functional?
Functional vs Imperative
In this blog post, we show an analysis of why it is necessary to go functional even with...
The Treacherous POODLE
How does the SSL fallback's works
Here we discuss the exploitation of an SSL/TLS flaw that creates a fallback on TLS usage to SSL 3.0.
Release the BEAST!
Understanding the BEAST
How does a theorized attack become practical after more than 10 years? Find out here.
My Heart Bleeds (But Not for You)
Understanding the flaw behind Heartbleed
Here we talk about Heartbleed, the result of a buggy implementation of the TLS protocol on...
Pars Orationis Non Est Secura
Using parser combinators to detect flaws
Learn here how to use Python and pyparsing to parse application code in order to find SQL...