Technical Corner
Technical Corner
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 2)
This article is the second part of case study CVE-2022-46527 and will discuss the discovery of the vulnerability and a proof of concept leading to a crash
Read this articlePublished on
26 June 2023
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 1)
Setting up the environment to scan IoT devices for vulnerabilities: Case of CVE-2022-46527
Read this articlePublished on
14 March 2023
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART2: gaining code execution
How to exploit the vulnerability in Firefox 56 and 57 to get code execution
Read this articlePublished on
19 September 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART1: controlling the instruction pointer
Find out how to take advantage of the whole underflow vulnerability on Firefox 56 and 57
Read this articlePublished on
04 July 2022
Adversary simulation exercise: when real-life meet business
This article is short story telling about one adversary simulation exercise we (POST CyberForce Offensive Security) performed.
Read this articlePublished on
08 March 2022
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
You might have seen the recent bug in iOS 14.0 to 14.4, that crashed the Wi-Fi service by naming an access point a specific way. Apple tagged this bug as a Denial of Service on the Wi-Fi service, but the Zecops [1] Research Team has shown proofs that it could be exploited, causing an RCE, and more precisely a Zero-Click RCE.
Read this articlePublished on
07 September 2021
Anatomy of a Red-Team exercise - Chapter 3
As discussed in previous scenario, we prepared several raspberry devices with a 4G modem, allowing us to remotely control the device without requiring being in proximity for operation.
Read this articlePublished on
29 June 2021
Anatomy of a Red-Team exercise - Chapter 2
Prior any actions, we focused on the payload crafting that will be used with our attack scenarios. We decided to go for PowerShell stageless reverse HTTPS payload that will be delivered using HTA dropper and then executed on the target machine.
Read this articlePublished on
20 April 2021
Anatomy of a Red-Team exercise - Chapter 1
A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.
Read this articlePublished on
22 March 2021
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?