Categories
Uncategorized

Seminars: ideal job offer – Revised

This post contains an assignment provided by the Seminars course at Howest Bruges. Second part of this assignment is following up on our ideal job offer that we chose before our internship. I was lucky in the sense that my internship came very close to the job offer I had chosen. This allowed me to […]

Categories
General security write-up

Easy bounties with subdomain discovery

Using Project Sonar for bug bounty

Categories
General Blog

My international internship experience – Accenture CFC Prague

The beginning For the beginning of this journey, we have to go back to September 2019. At this point, I attended the “Howest Internship market” (freely translated), an event organized by the school I attend where students have an entire day to make “speed-dates” with a lot of IT companies looking for interns. At first […]

Categories
write-up

CSCBE20: Pt 3, Where in the Word is…

For my last part about Cyber Security Challenge Belgium 2020, I’m writing a post about another fun challenge. The challenge was pretty simple, extract the flag from the .doc file. When receiving a file created by an Office product (Word, Excel, Powerpoint,…) the first thing that always comes to my mind is that these files […]

Categories
write-up

CSCBE20: Pt 2, Compile Online

As my second part of this write-up series, I will cover two relative small challenges that appeared in the qualifiers round of this year’s Cyber Security Challenge Belgium. Compile Online The idea was simple: someone had made an online C compiler, which could be used by sending C code to the server using netcat and […]

Categories
write-up

CSCBE20: 🌱 Succulent Security

This year marked our second year we participated in Cyber Security Challenge Belgium. Last year, my team got through qualifiers and were invited to Brussels for the semi-finals, where we ended a couple points short from entering the final. This year, we wanted to do better. During this year’s qualifiers, I was in Prague for […]

Categories
Tutorials

DNS Rebinding: Stealing WiFi credentials through your solar panel inverter

During one of my recent YouTube visits I noticed DEF CON had uploaded new talks which meant it was time to check them out. The following talk about DNS Rebinding caught my attention. Initially this post was made to release way sooner, however I decided to turn the topic into a presentation for a school […]

Categories
Vacature

Seminars: ideal job offer

This post contains an assignment provided by the Seminars course at Howest Bruges. Our company We are an international cyber security company that gives their employees what they deserve: a good environment, training sessions and exciting challenges. We are currently looking for penetration testers in multiple locations around the world. Job Description As a junior […]

Categories
General security

Security Conference: BruCON 0x0B (Ghent, Belgium)

Thanks to our second place in the BruCON Student CTF, me and my team won free tickets to the main conference for the second year in a row. Our prize for the CTF was not just free tickets but also some goodies and a book sponsored by Toreon, a Belgium based security company. Security conferences, […]

Categories
write-up

BruCON 0x0B Student CTF: Fake Malware

After participating in the BruCON Student CTF this year, my team ended up being second. This meant the four of us won tickets for the main BruCON 0x0B event. One of the challenges at the Student CTF was named “Fake Malware”. We were given a password locked zip file to start off with. Finding the […]