Vozec (@vozec1) 's Twitter Profile
Vozec

@vozec1

20ns🎉
Etudiant à l'ESNA / Pentester chez ACCEIS / Président de l'association ESN'HACK | Bug hunter

ID: 1509205292407574536

linkhttps://vozec.fr/ calendar_today30-03-2022 16:26:09

63 Tweet

632 Takipçi

186 Takip Edilen

Edra (@0xedra) 's Twitter Profile Photo

It's time to present my first little blog post, on XSS WAF bypass Feel free to send me feedback (: onetest.fr/posts/xss-waf-…

Worty (@_worty) 's Twitter Profile Photo

We manage to finish at the second place at Insomni'hack CTF finals ! Congratz to all the players and my team mates Romaiη  Noiche La Brosse Adam Nics Vozec Mathis Hammel & mouthon ! Again thanks a lot to the SCRT crew for the challenges ! See you next year !

We manage to finish at the second place at <a href="/1ns0mn1h4ck/">Insomni'hack</a> CTF finals !
Congratz to all the players and my team mates <a href="/JouetR/">Romaiη </a> <a href="/_Noiche/">Noiche</a> <a href="/adam_le_bon/">La Brosse Adam</a> <a href="/cy_nics/">Nics</a> <a href="/Vozec1/">Vozec</a> <a href="/MathisHammel/">Mathis Hammel</a> &amp; mouthon !

Again thanks a lot to the SCRT crew for the challenges !

See you next year !
Numb3rs (@numbrs) 's Twitter Profile Photo

hi, just wrote my first post on the exploitation of a random github VM, let me know what you think :) numb3rs.re/posts/popping_…

Jorian (@j0r1an) 's Twitter Profile Photo

A few weeks ago, I wanted to learn more about XS-Leaks. This ended in a vulnerability in CTFd that was exploitable with a new technique to detect status codes! The following post goes through my process of finding it and the proof of concept exploits: jorianwoltjer.com/blog/p/hacking…

Kévin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

Great research from scryh! I was keeping it for a CTF challenge, but it's probably too late now :p This trick is so powerful that it can be used to bypass most (if not all) server-side HTML sanitizers in the absence of a charset within the Content-Type response header 🤯

Great research from <a href="/scryh_/">scryh</a>!

I was keeping it for a CTF challenge, but it's probably too late now :p

This trick is so powerful that it can be used to bypass most (if not all) server-side HTML sanitizers in the absence of a charset within the Content-Type response header 🤯
Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be following the RFC. portswigger.net/research/split…

Laluka@OffenSkill (@thelaluka) 's Twitter Profile Photo

Hi Dear Infosec, @vozec1 & I are thrilled to release our new Spip Exploit Challenge, and start the school-year on an explosive note! 💣 You guessed it, we want you to find our... Unauth RCE on SPIP 4.3.1 🔥 This new challenge starts TODAY, here are the rules: - The challenge

Hi Dear Infosec,

@vozec1 &amp; I are thrilled to release our new Spip Exploit Challenge, and start the school-year on an explosive note! 💣

You guessed it, we want you to find our... Unauth RCE on SPIP 4.3.1 🔥

This new challenge starts TODAY, here are the rules:
- The challenge
ACCEIS (@acceis) 's Twitter Profile Photo

La team CTF ACCEIS fait sa rentrée avec le #CTF Barbhack , une belle première place 🥇 pour l'équipe pioupiou complétée avec Laluka@OffenSkill (Offenskill), Kévin GERVOT (Mizu) (bsecure) et Ooggle #Barbhack24

La team CTF ACCEIS fait sa rentrée avec le #CTF <a href="/_barbhack_/">Barbhack</a> , une belle première place 🥇 pour l'équipe pioupiou complétée avec <a href="/TheLaluka/">Laluka@OffenSkill</a>  (Offenskill), <a href="/kevin_mizu/">Kévin GERVOT (Mizu)</a> (bsecure) et <a href="/Ooggle_/">Ooggle</a> 
#Barbhack24
ESN'HACK (@esnhack) 's Twitter Profile Photo

🎉 Annonce du nouveau bureau de l'ESN'HACK 2024 ! 🎉 Nous sommes ravis de vous présenter notre nouvelle équipe pour l'année à venir. N'hestiez pas à rejoindre notre serveur discord, une annonce relative au SteakOverflow arrive très prochainement. 👀🍖 discord.com/invite/sdCBwdZ

Laluka@OffenSkill (@thelaluka) 's Twitter Profile Photo

Hello dear Hackers, 🧙‍♂️ After our 1st Spip Challenge ended, Vozec wanted to push the adventure further and found a new Post-Auth RCE ! 🎉😉 I then turned it into an Unauth-RCE 💣 We even managed to make some bucks with it 😏 Today's article is this story & write-up, enjoy! 💌

Hello dear Hackers, 🧙‍♂️

After our 1st Spip Challenge ended, <a href="/Vozec1/">Vozec</a> wanted to push the adventure further and found a new Post-Auth RCE ! 🎉😉
I then turned it into an Unauth-RCE 💣
We even managed to make some bucks with it 😏

Today's article is this story &amp; write-up, enjoy! 💌
ACCEIS (@acceis) 's Twitter Profile Photo

Merkle & Hellman partent en vacances🏝️🎒lequel optimise son sac à dos ? Les deux 😁Vozec te présente leur cryptosystème et te propose aussitôt de le casser💥Une attaque #ManInTheMiddle et deux attaques par réseaux euclidiens. acceis.fr/attaques-du-cr… #Cryptologie #Cybersécurité

Merkle &amp; Hellman partent en vacances🏝️🎒lequel optimise son sac à dos ?
Les deux 😁<a href="/Vozec1/">Vozec</a> te présente leur cryptosystème et te propose aussitôt de le casser💥Une attaque #ManInTheMiddle et deux attaques par réseaux euclidiens.
acceis.fr/attaques-du-cr…
#Cryptologie #Cybersécurité
Worty (@_worty) 's Twitter Profile Photo

My writeup for the KalmarCTF challenge "no sqli" is out, covering the exploitation of CVE-2024-6382, an integer overflow in the Rust's MongoDB library. A very interesting challenge, enjoy! :) worty.fr/post/writeups/…