Open in app

Sign In

Write

Sign In

x0rz
x0rz

3.2K Followers

Home

About

Published in

Just another infosec blog type of thing

·Apr 19, 2019

Hacking (Back) and Influence Operations

The new convergence of disinformation tactics and CNE in the Middle East — We all are collateral victims of very famous information operations, also known as influence operations. …

Cybersecurity

7 min read

Hacking (Back) and Influence Operations
Hacking (Back) and Influence Operations
Cybersecurity

7 min read


Published in

Just another infosec blog type of thing

·Dec 6, 2018

France might be losing its first big information war

Foreign propagandists are getting a strong foothold in France, and the traditional media can’t fight it — I already talked about psychological operations against France through social networks such as Twitter. This time foreign propagandists are leveraging current events (the yellow vests protests) to further their political agenda to a new level. Here is some part of my current investigation I wanted to share.

Social Media

5 min read

France might be losing its first big information war
France might be losing its first big information war
Social Media

5 min read


Published in

Just another infosec blog type of thing

·Nov 29, 2018

Hiding Through a Maze of IoT Devices

How to create the perfect anonymizing botnet by abusing UPnP features — and without any infection — Inception Framework In March 2018, Symantec reported about the Inception Framework abusing vulnerable UPnP services to hide themselves. The Inception APT, a cyber espionage group from an unknown origin used this since 2014 to launch stealthy attacks. …

Cybersecurity

7 min read

Hiding Through a Maze of IoT Devices
Hiding Through a Maze of IoT Devices
Cybersecurity

7 min read


Published in

Just another infosec blog type of thing

·Aug 24, 2018

A Look Into Signal’s Encrypted Profiles

Can this feature get abused for OSINT discovery? — According to Signal, “Profiles allow you to add a picture and display name that will be shown alongside your existing phone number when communicating with other users. Conversations will feel more personal. Group threads will be less confusing. …

Security

6 min read

A Look Into Signal’s Encrypted Profiles
A Look Into Signal’s Encrypted Profiles
Security

6 min read


Published in

Just another infosec blog type of thing

·Jul 12, 2018

Uncovering Foreign Trolls (Trying) To Influence French Elections on Twitter

An inside look at a cyber psychological operation against France — Where it all started: first link In June 2018, a mostly inactive Twitter account @viepepere (archived link) sent a threat message to @_rabbindesbois_ (French individual known for being a former Dark Net vendor according to his recent book). The now deleted tweet read, in Russian, “ Мы знаем, что вы делаете. Вы не должны были говорить…

Social Media

9 min read

Uncovering Foreign Trolls (Trying) To Influence French Elections on Twitter
Uncovering Foreign Trolls (Trying) To Influence French Elections on Twitter
Social Media

9 min read


Published in

Just another infosec blog type of thing

·May 22, 2018

Current State of Hacking Back

The slides of the talk I gave at ESE last week.

Hacking

1 min read

Current State of Hacking Back
Current State of Hacking Back
Hacking

1 min read


Published in

Just another infosec blog type of thing

·Jan 23, 2018

Introducing the first ever shitpost-based RNG

Using Twitter as an entropy source: the Internet is a chaotic mess, which happens to be a good source of entropy — Hey, what’s entropy? Looking at Wikipedia: entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data. Basically, when you’re generating keys (let’s say RSA 2048) you need true random numbers. You don’t want them to be deterministic (based on a timestamp…

Security

4 min read

Introducing the first ever shitpost-based RNG
Introducing the first ever shitpost-based RNG
Security

4 min read


Published in

Just another infosec blog type of thing

·Nov 7, 2017

Catching phishing before they catch you

Paypal phishing, paypal phishing everywhere — Let’s catch some phishing domain names using CertStream! What is Certificate Transparency? Certificate authorities (CA) get hacked (it already happened), and sometimes they mistakenly issue rogue certificates… That is why Google’s Certificate Transparency project try to fix several structural flaws in the SSL certificate system by providing an open framework for monitoring and auditing…

Phishing

2 min read

Catching phishing before they catch you
Catching phishing before they catch you
Phishing

2 min read


Published in

Just another infosec blog type of thing

·Oct 24, 2017

Securing a Web Hidden Service

Quick guide on how to preserve a .onion anonymity — While browsing the darknet (Onion websites), it’s quite stunning to see the number of badly configured Hidden Services that will leak directly or indirectly the underlying clearnet IP address. Thus canceling the server anonymity protection that can offer Tor Hidden Services. Here are a few rules you should consider following…

Privacy

4 min read

Securing a Web Hidden Service
Securing a Web Hidden Service
Privacy

4 min read


Published in

Just another infosec blog type of thing

·Oct 20, 2017

Link previews in IM apps and privacy

Most instant messaging applications are providing enriched link summaries (as shown next with Telegram link previews), including description and a preview image of the website. Depending on the implementation these nice-to-have features could become privacy intrusive: indeed, it might force your client into downloading some remote content from an untrusted…

Privacy

4 min read

Link previews in IM apps and privacy
Link previews in IM apps and privacy
Privacy

4 min read

x0rz

x0rz

3.2K Followers

Security Researcher

Following
  • Nathaniel Felsen

    Nathaniel Felsen

  • Medium

    Medium

  • thaddeus t. grugq

    thaddeus t. grugq

  • Luc Delsalle

    Luc Delsalle

  • Matt Nelson

    Matt Nelson

See all (46)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams