European Cyber Week 2022 Challenges
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-ECW2022-challenge.jpg)
Find here the crypto and web challenges that our teams created for the European Cyber Week pre-qualification tests of CTF, a recognized cybersecurity event that took place in Rennes from November 15 to 17, 2022.
European Cyber Week 2022 write-ups
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-ECW2022-write-ups.jpg)
Find here the write-ups of the crypto and web challenges that our teams created for the European Cyber Week pre-qualification tests of CTF
CVE-2021-37592 PoC: Eluding Suricata 6.0.3
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-CVE.jpg)
This article starts with a quick overview on NIDS (Network Intrusion Detection System) evasions to remind what it is and why it could happen.
Retour d’expérience de tests d’intrusion internes
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-retex-TI-internes.jpg)
Essor du numérique, diversification des surfaces d’exposition, multiplication des cyberattaques… Depuis plusieurs années, la sécurité informatique est devenue une composante essentielle de l’administration d’un Système d’Information (SI).
Ransomwares : quel mode opératoire en 2020 ?
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-ransomwares.jpg)
Depuis plusieurs années, l’écosystème informatique a dû faire face à une recrudescence de compromissions de systèmes d’informations par des rançongiciels, ou cryptolockers, qui s’introduisent principalement par des méthodes automatiques (_spear phishing_, etc.).
Spectre V1 in userland
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-spectre-v1.jpg)
We will discuss the feasibility in real world of the Spectre V1 flaw from a cross-process, userland perspective.
Sodinokibi / REvil Malware Analysis
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-sokinobi.jpg)
This article details the behavior of the Sodinokibi ransomware using static analysis with IDA Pro. Sodinokibi, also called REvil, […]
Linux RNG architecture
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-linux-rng.jpg)
Focus on the architecture of the Linux random number generator, also known as `/dev/urandom`. How does it work? Is it secure?
Windows filter communication ports
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-Windows-filter-communication-ports.jpg)
Brief technical analysis of the Microsoft Windows « filter communication port » kernel communication mechanism with filtering drivers.
Fragscapy: Fuzzing protocols to evade firewalls and IDS
![](https://www.amossys.fr/wp-content/uploads/thumbnail-blog-technique-Fragscapy.jpg)
Fragscapy is a tool that aims at detecting flaws in firewall and IDS by fuzzing the network messages sent through it. This open source project is available at [Amossys’ Github]