<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Hugo Sibony</title><description>Ethical Hacker — Cybersecurity Engineering @ EPITA</description><link>https://hugosibony.com/</link><item><title>Wifi IONIS setup</title><link>https://hugosibony.com/blog/wifi-epita/</link><guid isPermaLink="true">https://hugosibony.com/blog/wifi-epita/</guid><description>Connect to IONIS Wifi on Linux</description><pubDate>Mon, 08 Sep 2025 15:14:36 GMT</pubDate><category>notes</category></item><item><title>Attack/Defense Tricks</title><link>https://hugosibony.com/blog/attack-defense-tricks/</link><guid isPermaLink="true">https://hugosibony.com/blog/attack-defense-tricks/</guid><description>Compilation of Dirty RedTeam Tricks</description><pubDate>Fri, 05 Sep 2025 15:14:36 GMT</pubDate><category>tricks</category></item><item><title>Problèmeuh</title><link>https://hugosibony.com/writeups/fcsc/2025/crypto/abcxy/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/crypto/abcxy/</guid><description>A Diophantine puzzle involving linear equations, perfect squares, and a Pell equation.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Crypto</category></item><item><title>Analyse mémoire 1/5 - Exfiltration</title><link>https://hugosibony.com/writeups/fcsc/2025/forensics/analyse-memoire-1/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/forensics/analyse-memoire-1/</guid><description>Analyse d&apos;une capture mémoire pour identifier un malware exfiltrant des données.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Forensics</category></item><item><title>Analyse mémoire 2/5 - Origine de la menace</title><link>https://hugosibony.com/writeups/fcsc/2025/forensics/analyse-memoire-2/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/forensics/analyse-memoire-2/</guid><description>Identification du processus ayant chargé le malware en mémoire.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Forensics</category></item><item><title>iForensics - Backdoor</title><link>https://hugosibony.com/writeups/fcsc/2025/forensics/backdoor/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/forensics/backdoor/</guid><description>Analyse d&apos;un backup iOS pour identifier une backdoor dans une application.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Forensics</category></item><item><title>iForensics - iTreasure</title><link>https://hugosibony.com/writeups/fcsc/2025/forensics/itreasure/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/forensics/itreasure/</guid><description>Analyse d&apos;un backup iOS pour retrouver un trésor caché dans les messages.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Forensics</category></item><item><title>Signal sur chat</title><link>https://hugosibony.com/writeups/fcsc/2025/hardware/chat/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/hardware/chat/</guid><description>Décodage de signaux DSSS avec codes de Gold dans un fichier audio contenant du bruit de chat.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Hardware</category></item><item><title>Mechanical Display</title><link>https://hugosibony.com/writeups/fcsc/2025/hardware/mechanical-display/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/hardware/mechanical-display/</guid><description>Décodage d&apos;un flag transmis via un servomoteur contrôlé par un signal PWM capturé dans un fichier VCD.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Hardware</category></item><item><title>Le calme avant la tempest</title><link>https://hugosibony.com/writeups/fcsc/2025/hardware/tempest/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/hardware/tempest/</guid><description>Reconstruction d&apos;un signal vidéo PAL composite à partir d&apos;un flux échantillonné à 20 MHz</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Hardware</category></item><item><title>babyfuscation</title><link>https://hugosibony.com/writeups/fcsc/2025/reverse/babyfuscation/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/reverse/babyfuscation/</guid><description>Reverse engineering challenge involving a binary with obfuscated function names and custom string comparison.</description><pubDate>Sat, 19 Apr 2025 00:00:00 GMT</pubDate><category>Reverse</category></item><item><title>iForensics - iCrash</title><link>https://hugosibony.com/writeups/fcsc/2025/forensics/iforensics_icrash/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/forensics/iforensics_icrash/</guid><description>Retrouver le SSID, le BSSID et le compte iCloud à partir d&apos;un backup et d&apos;un sysdiagnose iOS.</description><pubDate>Fri, 18 Apr 2025 00:00:00 GMT</pubDate><category>Forensics</category></item><item><title>Voila</title><link>https://hugosibony.com/writeups/fcsc/2025/misc/alices_music_collection/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/misc/alices_music_collection/</guid><description>Identify a song using audio fingerprinting from a misconfigured MPD server.</description><pubDate>Fri, 18 Apr 2025 00:00:00 GMT</pubDate><category>Misc</category></item><item><title>ja4a4a4do0o0ore SSH!</title><link>https://hugosibony.com/writeups/fcsc/2025/misc/ja4a4a4do0o0ore_ssh/</link><guid isPermaLink="true">https://hugosibony.com/writeups/fcsc/2025/misc/ja4a4a4do0o0ore_ssh/</guid><description>Identifier la session SSH interactive d&apos;un attaquant et extraire les cookies SSH d&apos;une capture réseau.</description><pubDate>Fri, 18 Apr 2025 00:00:00 GMT</pubDate><category>Misc</category></item><item><title>Stable Reverse Shell</title><link>https://hugosibony.com/blog/stable-reverse-shell/</link><guid isPermaLink="true">https://hugosibony.com/blog/stable-reverse-shell/</guid><description>Steps to stabilize a shell</description><pubDate>Tue, 08 Apr 2025 15:14:36 GMT</pubDate><category>notes</category></item><item><title>AI Gaslighting</title><link>https://hugosibony.com/writeups/rootme/2025/dgse/mission1_ia/</link><guid isPermaLink="true">https://hugosibony.com/writeups/rootme/2025/dgse/mission1_ia/</guid><description>Mission 1: Trick the AI chatbot to give the leaked data key</description><pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate><category>IA</category></item><item><title>Document Tracker</title><link>https://hugosibony.com/writeups/rootme/2025/dgse/mission4_pentest/</link><guid isPermaLink="true">https://hugosibony.com/writeups/rootme/2025/dgse/mission4_pentest/</guid><description>Mission 4: Intrude the application to get the attack plans</description><pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate><category>pentest</category></item><item><title>PW Crack 1</title><link>https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_1/</link><guid isPermaLink="true">https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_1/</guid><description>Simple password cracking — reading a hardcoded password from Python source.</description><pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate><category>General</category></item><item><title>PW Crack 2</title><link>https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_2/</link><guid isPermaLink="true">https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_2/</guid><description>Password check bypass — extracting a hashed comparison value from Python.</description><pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate><category>General</category></item><item><title>PW Crack 3</title><link>https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_3/</link><guid isPermaLink="true">https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_3/</guid><description>Brute-forcing a password from a small candidate list against a hash check.</description><pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate><category>General</category></item><item><title>PW Crack 4</title><link>https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_4/</link><guid isPermaLink="true">https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_4/</guid><description>Scripted brute-force over a larger password list with hash verification.</description><pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate><category>General</category></item><item><title>PW Crack 5</title><link>https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_5/</link><guid isPermaLink="true">https://hugosibony.com/writeups/picoctf/2022/general_skills/pw_crack_5/</guid><description>Dictionary attack with custom hash — optimizing search over a large wordlist.</description><pubDate>Sun, 12 May 2024 00:00:00 GMT</pubDate><category>General</category></item><item><title>Tux Fan Club: Chasse au Trésor Pirate</title><link>https://hugosibony.com/writeups/epita/epirootkit/tux_fan_club/</link><guid isPermaLink="true">https://hugosibony.com/writeups/epita/epirootkit/tux_fan_club/</guid><description>Une chasse au trésor pirate impliquant des fichiers cachés et de la stéganographie</description><pubDate>Fri, 12 Apr 2024 00:00:00 GMT</pubDate><category>SYS2</category></item></channel></rss>