Whoami
My name is Adrien, a French student and open source enthusiast, passionate about computer science. The domains for which I approve an appetence are:
- CTF challenges.
- Penetration testing.
- Security (systems, network and applications).
- Development (I practice or already practice languages like C, PHP, Golang, Java/Kotlin, Rust, Ruby…).
- IoT via Arduino microcontrollers and Raspberry Pi.
- DevOps techniques (CI/CD).
Goals and others
I’ve been on the computer science field since 2013 and like many people in this one, I’m self-taught, although I’m still in my fifth year in computer science school. I’ve spent a lot of time on forums, blogs, watching Udemy courses and YouTube videos. In short I’ve really seen some very good and awful things. I am writing this blog in a way that I think best. I try to be as precise and concise as possible.
Objectives of this blog:
- Share my knowledge.
- Learn new things.
- Take away the fear of losing all my
.md
and.txt
files.
Capture the key
If you want to contact me, you’ll have to work a bit. I created this little challenge for CTF lovers who like to be challenged. The goal is to find my GPG public key via this image.
Some hints that may be useful:
- Does
year()
iteration with AES CBC suffice? xato-net-10-million-passwords.txt
.
Here is the content of the .bash_history
file that has been recovered (but it is a bit corrupted).
openssl enc -aes-256�bc -pbkd<2 iter/2021 -in puli{gg -ot pu�ic.gp�enc *k "@s"d
st1ghide mb&d -cf ct.jpg -9fpub+ic�pg.erc -sf ctk.jpg -B 9 e triple�s cbc -N -p ""
Thoughts
Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.
- Edward Snowden
On ne peut pas nier l’existence de ce qui n’a pas d’existence.
- Thierry Malleret
Un mensonge peut faire le tour de la Terre, le temps que la vérité mette ses chaussures.
- Mark Twain
Don’t take security advice as the unquestionable truth, always dig deeper to know why.
- Unknown