Blog - Add excerpt

pull/1/head
Swissky 2019-12-27 11:34:12 +01:00
parent 2697774465
commit 8b23da02c9
11 changed files with 25 additions and 2 deletions

View File

@ -84,3 +84,6 @@ exclude:
- LICENSE
- README.md
- CNAME
# Split page with more in description
excerpt_separator: <!--more-->

View File

@ -6,6 +6,8 @@ title: Welcome on my Jekyll!
Hi friend !
Let's talk about security tips and tricks.
<!--more-->
This blog was generated with Jekyll now, use the following commands to reproduce it.
{% highlight bash%}

View File

@ -9,6 +9,8 @@ Prequals online
- [Web 150 - GoldFish](ECW-CTF/#web-150---goldfish)
- [Web 175 - Magic Car](ECW-CTF/#web-175---magic-car)
<!--more-->
## Web 50 - Hall of Fame
This challenge was a basic SQL injection, let's follow our [methodology](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL injection/MySQL Injection.md) and extract the informations in the database. First we need to extract the columns number of the current "SELECT column1, column2 FROM ..."
{% highlight php%}

View File

@ -6,6 +6,8 @@ title: French Croissant - or why you need to lock your computer
Last year the first day of my internship I was given a computer and asked to install and secure it for two days. After that delay anyone can try to attack and compromise my machine, and if so I was welcome to buy some "French Croissants" to the team while the attacker explain his method to get access into your computer the next morning.
There are some techniques you need to be aware of when you're securing your machine, the list below is not exhaustive.
<!--more-->
## Open session
When your colleague leave their computer without locking their session, it's time to go on their laptop and interact with it. In this scenario you can :
- send an email to the team if he was logged into his mail account

View File

@ -6,6 +6,8 @@ title: WHID Injector - Tips and Tricks
## WHID Injector - Tips and Tricks
What is it ? The WHID Injector is USB Key which act as a remote keyboard. Basically it sets up a Wifi Access Point where you can connect and send whatever you want on the machine. It also has a Rubber Ducky payload converter, an exfiltrated data tab and many more.
<!--more-->
What can I do ? Everything you could do with a keyboard plugged into a computer, for example : using [WHID Toolkit](https://github.com/swisskyrepo/WHID_Toolkit) you can spawn a reverse-shell :D

View File

@ -3,8 +3,9 @@ layout: post
title: SIGSEGV1 Writeup - MD Auth
---
Let's talk about the "MD Auth" challenge, I admit I started with this challenge thinking it would be about "Markdown".
I was wrong but it was nonetheless interesting to solve.
Let's talk about the "MD Auth" challenge, I admit I started with this challenge thinking it would be about "Markdown". I was wrong but it was nonetheless interesting to solve.
<!--more-->
The source code of the index was available by requesting : [http://finale-docker.rtfm.re:4444/?source](http://finale-docker.rtfm.re:4444/?source)

View File

@ -4,6 +4,9 @@ title: An XSS Story
---
Last night I stumbled across an XSS in a bug bounty program, this was quite fun to exploit.
<!--more-->
A little bit of context, the URL was as follows:
{% highlight bash%}

View File

@ -5,6 +5,8 @@ title: UYBHYS - Sea Monster Attack & Defense CTF
Last week-end I teamed up with members from [Aperikube](https://www.aperikube.fr) for an Attack/Defense CTF which took place in Brest - France. In this "small" blog post I will write about this experience, the challenges and our methodology :)
<!--more-->
![Banner]({{ site.baseurl }}/images/SeaMonsterBanner.png "Banner"){: .center-image }
Rules & informations about the CTF are available in the following PDF : [CTF_UYBHYS.pdf]({{ site.baseurl }}/files/CTF_UYBHYS.pdf)

View File

@ -5,6 +5,8 @@ title: Ph0wn - Smart Devices CTF
Another week another CTF, this time it was the [Ph0wn](https://ph0wn.org) at Sophia Antipolis (France). I teamed up with members from [@Maki](https://twitter.com/maki_mitz), [@iansus](https://twitter.com/iansus), [@MansourCyril](https://twitter.com/MansourCyril) and [@0hax](https://twitter.com/0hax2). We reached the **second place** of this IoT/Hardware CTF.
<!--more-->
![Banner]({{ site.baseurl }}/images/Ph0wn/Ph0wnBanner.png "Banner"){: .center-image }

View File

@ -7,6 +7,8 @@ title: DVID - Damn Vulnerable IoT Device
Who ever wanted to learn about Hardware Hacking ? I found this small opensource **IoT hacking** learning board while I was in a security event. It is designed by [@vulcainreo](https://twitter.com/vulcainreo/) and cost around 45€, more than 300 units were shipped around the world.
<!--more-->
Let's dig into this awesome project and clone the git : `https://github.com/Vulcainreo/DVID.git` !
## Challenges' Writeup

View File

@ -5,6 +5,8 @@ title: HIP19 Writeup - Meet Your Doctor 1,2,3
Last wednesday I was in the Hack In Paris event for the 3rd time. As always there were some great conferences and challenges, and a new competition called "Hacker Jeopardy" which was very fun! During the Wargame I focused my time on Web challenges based on the `graphql` technology which was new to me, you will find below my writeups for the `Meet Your Doctor` challenges.
<!--more-->
![HIP Wargame 2019]({{ site.baseurl }}/images/hip19_wargame.png "HIP Wargame 2019"){: .center-image }