Jean-Michel AmblatExfiltrating data outside the O365 secure Tenant, Outlook exampleBrief disclaimer before we get started: this post is purposely long to help anyone without prior experience dealing with data exfiltration…Mar 3, 2022Mar 3, 2022
Jean-Michel AmblatExfiltration series: abusing FirefoxIn this quick post, from an insider’s perspective on data exfiltration, we examine Firefox’s Sync Now feature. It syncs bookmarks, themes…Jul 24, 2021Jul 24, 2021
Jean-Michel AmblatOrganizing your very first internal security competitionLast week, I had the privilege of organizing our first internal security competition, and it was an incredibly rewarding experience! I…Feb 2, 2020Feb 2, 2020
Jean-Michel AmblatExfiltration series: Spotexfil“Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.” — WikipediaJun 7, 2019Jun 7, 2019
Jean-Michel AmblatAbusing certificates for data exfiltration“Data exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer.” — WikipediaMay 11, 2019May 11, 2019
Jean-Michel AmblatFirst steps with Ghidra: crackme01Unless you have been sleeping under a rock lately, you may have heard about a new interesting tool released by the NSA: Ghidra. This…Apr 11, 2019Apr 11, 2019