Open in app

Sign In

Write

Sign In

Philippe Delteil
Philippe Delteil

434 Followers

Home

About

Published in

Hacking/Security

·Sep 18

Password Reset Token Disclosure[Chilexpress]

This must be one of the most incredible vulnerabilities I have come across so far. Mainly because Chilexpress is a large company that (supposedly) has gone through several rounds of penetration testing and security certifications. Vulnerability This vulnerability occurs when the “forgot password” functionality of a web application or service returns…

Web

2 min read

Password Reset Token Disclosure[Chilexpress]
Password Reset Token Disclosure[Chilexpress]
Web

2 min read


May 19

How to use Roam v2 features on Roam v1

An easy way to get some features intended for Wahoo Roam v2 using Roam v1 hardware. Of course, there are some features that cannot be added doing a software mod only, for example, the use of multi-band GPS. …

Wahoo

2 min read

How to use Roam v2 features on Roam v1
How to use Roam v2 features on Roam v1
Wahoo

2 min read


Published in

Wahoo hacking

·May 16

How to download all Wahoo firmwares

Step by step guide how to find and download all wahoo firmware available versions. If you are doing some research, hacking or reversing Wahoo's firmwares (Android based by the way) this might be helpful: Let's imagine you need to find all versions but you only have the following info: https://bolt.wahoofitness.com/boltapp/version.json …

Wahoo

2 min read

How to download all Wahoo firmwares
How to download all Wahoo firmwares
Wahoo

2 min read


May 10

Adding a Custom Page to your Wahoo device using HTML

Wahoo devices are popular cycling computers that offers a wide range of features and functionalities for cyclists. One of the unique (and unknown to many) features of the Wahoo devices is the ability to add custom pages in HTML format, . …

Wahoo

3 min read

Adding a Custom Page to your Wahoo device using HTML
Adding a Custom Page to your Wahoo device using HTML
Wahoo

3 min read


Published in

Wahoo hacking

·May 10

How to build Elemntary [Wahoo]

Step by step guide in how to build elemntary What's elemntary? It's a open source software developed in Electron, a framework for building cross-platform desktop applications using web technologies such as HTML, CSS, and JavaScript. What does it do? It allows you to read and modify content and properties of your Wahoo device, which is based…

Wahoo

3 min read

How to build Elemntary
How to build Elemntary
Wahoo

3 min read


Published in

Write-ups HackTheBox

·Jan 21

How to solve Illumination (Forensics)[HTB]

Step by step on how to solve this Forensics challenge After downloading the zip file and unzipping it, we are left with the following structure: > tree -a -L 2 . ├── bot.js ├── config.json └── .git ├── COMMIT_EDITMSG ├── config ├── description ├── HEAD ├── hooks ├── index ├── info ├── logs ├──…

Git

2 min read

How to solve Illumination (Forensics)[HTB]
How to solve Illumination (Forensics)[HTB]
Git

2 min read


Published in

Write-ups HackTheBox

·Jan 18

M0rsarchive [Misc] Writeup HTB

In this problem we have two files: a zip file with password and an image. Check the challenge here.

Hackthebox

1 min read

M0rsarchive [Misc] Writeup HTB
M0rsarchive [Misc] Writeup HTB
Hackthebox

1 min read


Published in

Write-ups HackTheBox

·Jan 14

How to solve MarketDump [HackTheBox]

Step by step on how to solve this Forensics challenge. To can check it here. We get a pcapng file, which we can open with Wireshark. The clues in the problem tell us that an attacker used the webserver to pivot into the network. Reviewing the data we see that…

Hackthebox

2 min read

How to solve MarketDump [HackTheBox]
How to solve MarketDump [HackTheBox]
Hackthebox

2 min read


Published in

Hacking/Security

·Jan 14

How to solve USB Ripper (Forensic)

How to solve step by step the challenge USB Ripper from the HackTheBox. We download and unzip the file, what we get is: > tree . ├── auth.json └── syslog 0 directories, 2 files Let’s see the content of the files: auth.json

Hackthebox

2 min read

How to solve USB Ripper (Forensic)
How to solve USB Ripper (Forensic)
Hackthebox

2 min read


Published in

Write-ups HackTheBox

·Jan 13

CryptoHorrific [Mobile] [Writeup]

Step by step writeup Link to the challenge. Get the parameters to decrypt the text: Use IDA to get the assembler code and F5 to generate pseudo code. In the challenge.plist file we find the following: bplist00��TflagRidUtitle_XTq+CWzQS0wYzs2rJ+GNrPLP6qekDbwze6fIeRRwBK2WXHOhba7WR2OGNUFKoAvyW7njTCMlQzlwIRdJvaP2iYQ==S123_HackTheBoxIsCool After some trial and error, we infer that the base64 text must be…

Mobile

1 min read

CryptoHorrific [Mobile] [Writeup]
CryptoHorrific [Mobile] [Writeup]
Mobile

1 min read

Philippe Delteil

Philippe Delteil

434 Followers
Following
  • Muhammad Daffa

    Muhammad Daffa

  • Airman

    Airman

  • Monish Basaniwal

    Monish Basaniwal

  • Viktor Mares

    Viktor Mares

  • Lev Shmelev

    Lev Shmelev

See all (60)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams