Open in app

Sign In

Write

Sign In

INSEC ENSIAS Club
INSEC ENSIAS Club

70 Followers

Home

About

Mar 6

Blog09: Misc — MCSC v10 Writeups: Part Two (Pwn Challenges)

Hello again folks! You’ve been a lot to request the writeups for the pwn challenges from the MCSC v10’s CTF. So, here they are. Challenge — Whisper [thamugadi@thinkpad whisper]$ checksec whisper [*] ‘/home/thamugadi/mcsc/whisper/whisper’ Arch: amd64–64-little RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments …

Cybersecurity

4 min read

Cybersecurity

4 min read


Mar 6

Blog08: Misc — MCSC v10 Writeups: Part One (Reverse Challenges)

Hello Folks! The v10 of our major event, the MCSC, has come to an end and so has its CTF competition. The winners have been crowned, but everyone seemed eager to get the full details of the challenges that were up for the grabs. For that very reason, we will be…

Cybersecurity

6 min read

Blog08: Misc — MCSC v10 Writeups: Part One (Reverse Challenges)
Blog08: Misc — MCSC v10 Writeups: Part One (Reverse Challenges)
Cybersecurity

6 min read


Jan 22

Blog 07: Misc — JSON Web Token(JWT)

Hey folks! I wanted to take a moment to apologize for the lack of updates on the blog recently. As some of you may know, we have been focused on preparing for the exams and unfortunately, this has taken up a significant amount of the time and energy, but…

Cybersecurity

9 min read

Blog 07: Misc — JSON Web Token(JWT)
Blog 07: Misc — JSON Web Token(JWT)
Cybersecurity

9 min read


Dec 10, 2022

Blog06: Misc — How speedrunners came to be at the cutting edge of binary exploitation techniques

For many, watching a speedrun might seem like watching a magician perform. To put it briefly, a speedrun in general is when a highly experienced player, often performing complex and difficult glitches by on their own and without any external help, sets out to finish a game that could…

Security

6 min read

Blog06: Misc — How speedrunners came to be at the cutting edge of binary exploitation techniques
Blog06: Misc — How speedrunners came to be at the cutting edge of binary exploitation techniques
Security

6 min read


Dec 4, 2022

Blog05: BFTP — Koobface: The rise and fall of the zombie army

The day is the 31st of July 2008. “I Kissed A Girl” by Katy Perry is at the top of the Billboard Hot 100, but things are starting to get hot elsewhere. Kaspersky Lab detected two variants of a new worm, Net-Worm.Win32.Koobface.a. and Net-Worm.Win32.Koobface.b, which attack MySpace and Facebook respectively. …

8 min read

Blog05: BFTP — Koobface: Part One — The Zombie Army
Blog05: BFTP — Koobface: Part One — The Zombie Army

8 min read


Nov 26, 2022

Blog04: Misc — Assembly’s ABCs

Note: This blog will consider that you have basic knowledge of how a computer works, as well as some coding knowledge. Now, let’s get right into it. If you have tried playing CTFs before, if you have dived into cybersecurity or if you have simply been learning how to code…

Assembly Language

8 min read

Blog04: Misc — Assembly’s ABCs
Blog04: Misc — Assembly’s ABCs
Assembly Language

8 min read


Nov 19, 2022

Blog03: BFTP — Spotify full acount takeover

Hi Folks ! before we get started here is some basic stuff that will helps you understand this attack. character encoding: is the process of assigning numbers to graphical characters, especially the written characters of human language, allowing them to be stored, transmitted, and transformed using digital computers(this is a wikipedia definition). …

Security

6 min read

Blog03: BFTP — Spotify full acount takeover
Blog03: BFTP — Spotify full acount takeover
Security

6 min read


Nov 12, 2022

Blog02: T&T — Passwords! TOO MANY OF THEM

Hi Folks! Welcome back to our blog. Today we will be looking together at an issue that almost everyone deals with on a daily basis, the issue of password management. By the end of this article, we will have gone through several methods and tools that help make sure our passwords are…

Cybersecurity

6 min read

Blog02: T&T — Passwords! TOO MANY OF THEM
Blog02: T&T — Passwords! TOO MANY OF THEM
Cybersecurity

6 min read


Nov 5, 2022

Blog01: BFTP — Mitnick’s Blind IP Spoofing

Hi folks! I would like to make it clear that my beginning in the security world was quite the coincidence. But before that I really liked networking. One day I was reading a course “Maîtrisez vos applications et réseaux TCP/IP” by Eric Lalitte that I recommend to everyone starting up in…

Cybersecurity

7 min read

Blog01: BFTP — Mitnick’s Blind IP Spoofing
Blog01: BFTP — Mitnick’s Blind IP Spoofing
Cybersecurity

7 min read


Oct 28, 2022

Blog00: Hello world!

Hi folks ! Welcome to the first article of our revamped blog. And more importantly, for those who have never been here, welcome to our blog, the INSEC Blog! Through this blog we will be sharing articles, tips and tricks from our team here at INSEC ENSIAS. Brief presentation of INSEC ENSIAS: INSEC ENSIAS is…

Security

2 min read

Blog00: Hello world!
Blog00: Hello world!
Security

2 min read

INSEC ENSIAS Club

INSEC ENSIAS Club

70 Followers

INSEC is the resident computer security club at ENSIAS.

Following
  • Orwa Atyat

    Orwa Atyat

  • Soufiane Habti

    Soufiane Habti

  • Ahmad Halabi

    Ahmad Halabi

  • Asmae Leghmid

    Asmae Leghmid

See all (6)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech