OAuth 2.x and OpenID Connect sequence diagrams
Some sequence diagrams about OAuth 2.x and OpenID Connect.
View ArticleUsing a Kap&Link smart card reader with CPS3 smart cards on Linux
Tutorial on how to get Carte Professionnel de Santé 3 (CPS3) smart cards work with Firefox under Linux with a Kap&Link smart card reader. It has some information to understand the related lingo,...
View ArticleCode execution through MIME-type association of Mono interpreter
A dangerous file type association in Debian which could be used to trigger arbitrary code execution.
View ArticleMIME-type spoofing in Firefox/Thunderbird and file managers
An interesting spoofing attack resulting from the interaction between Firefox (or Thunderbird) MIME types handling and file managers.
View ArticleArbitrary file write in Stellarium file association
I found an arbitrary file write vulnerability (through path traversal) which would be exploited for arbitrary code execution in Stellarium (desktop version).
View ArticleShell command and Emacs Lisp injection in emacsclient-mail.desktop
Shell command injection and Emacs Lisp injection vulnerabilities in one of the Emacs Desktop Entry (emacsclient-mail.desktop) leading to arbitrary code execution through a crafted mailto: URI.
View ArticleSimple terminal image display using the iTerm2 image protocol
A simple way to display image in a terminal using the iTerm2 image protocol. This is supported by iTerm2, WezTerm, recent versions of Konsole.
View ArticleAnalysing structured log files with simple tools
Some tools and other notes when you just want to analyze your structured log files locally using simple tools with a focus for newline-delimited JSON (NDJSON) / JSON lines / JSON Text Sequences.
View ArticleArbitrary code execution through kitty-open.desktop file association
In Debian kitty package, the kitty-open.desktop file would associate kitty +open with several MIME types. This could be used to arbitrary trigger code execution by serving a file with such a MIME...
View ArticleOpenSSH tunneling guide
The OpenSSH client has a lot of very powerful features for tunneling applications through a SSH connections and is one of my favorite tools for quick-and-dirty network plumbing tasks. It can be very...
View ArticleBypassing XSS filters
In this post, I am describing some payloads which I used to bypass two distinct XSS filter implementations (such as Web Application Firewalls (WAF)) as well as the approach to design them.
View ArticleTransformer-decoder language models
Some notes on how transformer-decoder language models work, taking GPT-2 as an example, and with lots references in order to dig deeper.
View ArticleExposing services in/out Podman containers
Some more tips for interacting with the namespaces of Podman containers.
View ArticleNeural Network Distillation
Overview of neural network distillation as done in “Distilling the Knowledge in a Neural Network” (Hinton et al, 2014).
View Article