Is ProtonMail implemented a mechanism to prevent cookies stealing?

I want to check if I can steal my own ProtonMail cookies. I connect to my account, I delete the cookie named AUTH-x12334xxxaazzzrf6567788ddd (cookie name is randomized name). I refresh the page and as expected, I am disconnected. It means … Continue reading Is ProtonMail implemented a mechanism to prevent cookies stealing?

Is SerializationException sign of Serialization/Deserialization vulnerability?

I am doing a bug bounty. I intercepted the POST request to the inscription in the target website. I modified the first name and last name POST params to inject bad char (in order to SQL inject) but the API/Registration service sends me a r… Continue reading Is SerializationException sign of Serialization/Deserialization vulnerability?

Are there techniques that can hide the execution of malware when Windows starts up without executing the malware as administator?

I am interested by malware analysis and particularly about persistence mechanisms.
The Startup tab of the taskmanager.exe shows applications which starts in same time of computer or user session.

I think the taskmanager.exe looks for ex… Continue reading Are there techniques that can hide the execution of malware when Windows starts up without executing the malware as administator?

Is malware programmed in high-level language will be more detected than malware programmed in low-level language?

I would like to know if a simple malware designed to execute commands received by a C&C will have the same result rate if programmed in :

lower-language like C++
high-language like Python (converted to executable with a Python conver… Continue reading Is malware programmed in high-level language will be more detected than malware programmed in low-level language?

Is better to have as password a sentence or first letter of the sentence?

Which is better master KeePass password to prevent any type of bruteforce between theses two type of password :

Complete sentence invented by user like : I like cheeseburger,
tomatoes and fries ! 🙂
Each first letter of th… Continue reading Is better to have as password a sentence or first letter of the sentence?

What are the best tools to make a perfect environment to develop a Metasploit module?

I am developping my first Metasploit module. I read the starting page and no tools are mentioned to build a beautiful environment.

At the moment, I use gedit to develop my module on Kali Linux. The problem is I am obligated… Continue reading What are the best tools to make a perfect environment to develop a Metasploit module?