<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
  <title>Breakpoint</title>
  <description>Stepping through security</description>
  <link>https://breakpoint.purrfect.fr</link>
  <lastBuildDate>Wed, 11 Feb 2026 12:37:50 +0100</lastBuildDate>
  <pubDate>Wed, 11 Feb 2026 12:37:50 +0100</pubDate>
  <ttl>7200</ttl>


  <item>
    <title>Vulnerabilities in Dueling Nexus</title>
    <description>Dueling Nexus is a free Yu-Gi-Oh dueling platform, the security of which leaves to be desired. Here are some vulnerabilities that you should be aware of as a duelist.</description>
    <link>https://breakpoint.purrfect.fr/article/duelingnexus_audit.html</link>
    <pubDate>Wed, 11 Feb 2026 12:37:12 +0100</pubDate>
  </item>


  <item>
    <title>★ A Security audit of GRR</title>
    <description>GRR is a French open-source booking management system. This audit revealed many important vulnerabilities that have since been fixed.</description>
    <link>https://breakpoint.purrfect.fr/article/grr_audit.html</link>
    <pubDate>Wed, 11 Feb 2026 01:26:24 +0100</pubDate>
  </item>


  <item>
    <title>★ Suspicious Statistics in Allergic Rhinitis Study</title>
    <description>An analysis of strange statistical mistakes in a biology paper about a randomized controlled trial studying the effect of probiotics on allergic rhinitis.</description>
    <link>https://breakpoint.purrfect.fr/article/suspicious_statistics_rct.html</link>
    <pubDate>Mon, 16 Jun 2025 12:40:36 +0200</pubDate>
  </item>


  <item>
    <title>A look at the Vault password manager</title>
    <description>Let's study a broken password manager to understand some vulnerabilities specific to storage encryption.</description>
    <link>https://breakpoint.purrfect.fr/article/vault_password_manager.html</link>
    <pubDate>Mon, 26 May 2025 23:35:34 +0200</pubDate>
  </item>


  <item>
    <title>Breaking Grandpa: A look at RFC 1004</title>
    <description>Where we find a novel attack against a very very old authentication protocol with the help of Verifpal.</description>
    <link>https://breakpoint.purrfect.fr/article/breaking_grandpa.html</link>
    <pubDate>Mon, 16 Oct 2023 23:50:04 +0200</pubDate>
  </item>


  <item>
    <title>Dusty File: Padlet Server-Side Request Forgery</title>
    <description>First installment of the Dusty Files series, we look at the discovery and exploitation of a SSRF in Padlet.</description>
    <link>https://breakpoint.purrfect.fr/article/df_padlet_ssrf.html</link>
    <pubDate>Tue, 31 May 2022 22:35:02 +0200</pubDate>
  </item>


  <item>
    <title>★ Cracking Phobos UUID</title>
    <description>The standard D library provides a random UUID implementation that relies on regular pseudo-number generation and is not cryptographically secure. We show how this can be exploited in practice to predict future UUIDs.</description>
    <link>https://breakpoint.purrfect.fr/article/cracking_phobos_uuid.html</link>
    <pubDate>Mon, 24 Aug 2020 10:08:40 +0200</pubDate>
  </item>


  <item>
    <title>Review of the D library Crypto</title>
    <description>Crypto is a cryptography library for the D programming language. I performed a review of the implementation of RSA that showed many issues. This article discusses these issues in details.</description>
    <link>https://breakpoint.purrfect.fr/article/review_crypto_d.html</link>
    <pubDate>Tue, 30 Jun 2020 22:36:38 +0200</pubDate>
  </item>


  <item>
    <title>Stirling mug top</title>
    <description>Stirling engines are simple, safe and dependable. What if we used them to transform our tea into phone chargers?</description>
    <link>https://breakpoint.purrfect.fr/article/stirling_mug_top.html</link>
    <pubDate>Sat, 20 Jun 2020 21:12:22 +0200</pubDate>
  </item>


  <item>
    <title>★ HPLIP Privilege Escalation</title>
    <description>Study of a file-based privilege escalation in HPLIP. Writable directories are still a liability!</description>
    <link>https://breakpoint.purrfect.fr/article/hplip_privesc.html</link>
    <pubDate>Fri, 6 Dec 2019 18:55:28 +0100</pubDate>
  </item>


  <item>
    <title>Opening combination locks</title>
    <description>Got a 3 or 4 digit combination lock that you can't open? Not anymore! Here are a few tips and tricks to open almost any combination lock you may find.</description>
    <link>https://breakpoint.purrfect.fr/article/opening_combination_locks.html</link>
    <pubDate>Fri, 21 Jun 2019 01:02:12 +0200</pubDate>
  </item>


  <item>
    <title>Dirduster: short presentation</title>
    <description>My web directory bruteforcing tool is finally feature complete after some years of development and professional use. Here's a short presentation of its goals and usage.</description>
    <link>https://breakpoint.purrfect.fr/article/dirduster_presentation.html</link>
    <pubDate>Thu, 20 Jun 2019 20:44:39 +0200</pubDate>
  </item>


  <item>
    <title>How to size a hash? More mental calculations</title>
    <description>Determining the right size of hash to use to avoid collisions can be tricky, but it's easier than it sounds with the right mental trick.</description>
    <link>https://breakpoint.purrfect.fr/article/size_hash.html</link>
    <pubDate>Fri, 1 Mar 2019 16:26:40 +0100</pubDate>
  </item>


  <item>
    <title>★ Breaking dependencies with Github account takeover</title>
    <description>Let's raise Github projects back from the dead to take control of hundreds of Dub, Go and AUR packages!</description>
    <link>https://breakpoint.purrfect.fr/article/github_account_takeover.html</link>
    <pubDate>Sat, 9 Jun 2018 22:11:06 +0200</pubDate>
  </item>


  <item>
    <title>Mental calculations for IT professionals</title>
    <description>We've lost the habit to perform mental calculations and estimates since working with computers. I'd like to show that it's really not hard and actually very useful, here by estimating the time needed to crack a key.</description>
    <link>https://breakpoint.purrfect.fr/article/mental_calculations.html</link>
    <pubDate>Sun, 15 Apr 2018 00:05:27 +0200</pubDate>
  </item>


  <item>
    <title>Docker for pentesters</title>
    <description>Docker is generally presented as a developer tool, but it can be very useful to security professionals too! Let's show how easy to use it can be in that regard.</description>
    <link>https://breakpoint.purrfect.fr/article/docker_pentesters.html</link>
    <pubDate>Sat, 24 Feb 2018 11:11:44 +0100</pubDate>
  </item>


  <item>
    <title>Internal Penetration Tests</title>
    <description>Asked to perform an internal pentest with no clue where to start from? Here's a guideline that you might find useful.</description>
    <link>https://breakpoint.purrfect.fr/article/internal_penetration_tests.html</link>
    <pubDate>Sat, 20 Jan 2018 15:27:54 +0100</pubDate>
  </item>


  <item>
    <title>VBS Reverse Shell</title>
    <description>P0wning a Windows box without Powershell? Easy with VBS!</description>
    <link>https://breakpoint.purrfect.fr/article/vbs_reverse_shell.html</link>
    <pubDate>Thu, 11 Jan 2018 20:17:26 +0100</pubDate>
  </item>


  <item>
    <title>D sightseeing: crc32</title>
    <description>Let's have a glance at a real although very short D program to discuss some of its features.</description>
    <link>https://breakpoint.purrfect.fr/article/d_sightseeing_crc32.html</link>
    <pubDate>Thu, 15 Jun 2017 23:38:09 +0200</pubDate>
  </item>


  <item>
    <title>SSL/TLS Configuration Recommendations</title>
    <description>How to configure SSL/TLS on your server in order to make it secure? Here is the way to do it quick and cleanly.</description>
    <link>https://breakpoint.purrfect.fr/article/ssl_tls_recommendations.html</link>
    <pubDate>Thu, 15 Jun 2017 20:07:34 +0200</pubDate>
  </item>


  <item>
    <title>Hacking the simplest database</title>
    <description>Julia Evans proposed the simplest database, let's take it down! A case study of simple file manipulations in bash.</description>
    <link>https://breakpoint.purrfect.fr/article/hacking_simplest_database.html</link>
    <pubDate>Sun, 11 Jun 2017 22:46:18 +0200</pubDate>
  </item>


  <item>
    <title>Fixing video noise with sox</title>
    <description>How to use sox for something simple and practical: fixing the noise in a youtube video.</description>
    <link>https://breakpoint.purrfect.fr/article/fix_video_noise_sox.html</link>
    <pubDate>Mon, 29 May 2017 20:09:18 +0200</pubDate>
  </item>


  <item>
    <title>★ Why we need authenticated cryptography</title>
    <description>Simple demonstration of how an attacker could tamper with an encrypted message to his benefit without ever decrypting it in the absence of message authentication.</description>
    <link>https://breakpoint.purrfect.fr/article/demo_bank.html</link>
    <pubDate>Sun, 2 Apr 2017 11:49:11 +0200</pubDate>
  </item>


  <item>
    <title>★ Weaponizing Excel Webservice</title>
    <description>Excel formula injections are common in programs generating XLS files, but often considered harmless. This discusses a new technique that greatly improve the Red Team situation.</description>
    <link>https://breakpoint.purrfect.fr/article/excel_webservice.html</link>
    <pubDate>Sat, 1 Apr 2017 00:30:08 +0200</pubDate>
  </item>


  <item>
    <title>Privilege Escalations</title>
    <description>How to identify flawed resource management leading to privilege escalation. Part of the Fast Security Source Code Review series.</description>
    <link>https://breakpoint.purrfect.fr/article/scr_privesc.html</link>
    <pubDate>Wed, 22 Mar 2017 01:05:29 +0100</pubDate>
  </item>


  <item>
    <title>Fast Security Source Code Review</title>
    <description>Introduction to the main concepts behind a fast security review. Intended for developers as well as pentesters.</description>
    <link>https://breakpoint.purrfect.fr/article/source_code_review.html</link>
    <pubDate>Wed, 22 Mar 2017 00:59:39 +0100</pubDate>
  </item>


  <item>
    <title>How secure is unpredictableSeed?</title>
    <description>D's unpredictableSeed is sometimes used to compensate for the lack of a CSPRNG in the standard library. But how secure is that really?</description>
    <link>https://breakpoint.purrfect.fr/article/unpredictableSeed.html</link>
    <pubDate>Sun, 26 Feb 2017 18:52:38 +0100</pubDate>
  </item>


  <item>
    <title>Crypter writeup</title>
    <description>"A file was encrypted. You have the encryption software and an encrypted file. Decrypt that file." Detailed writeup using radare2.</description>
    <link>https://breakpoint.purrfect.fr/article/crypter_writeup.html</link>
    <pubDate>Sat, 25 Feb 2017 03:16:43 +0100</pubDate>
  </item>


  <item>
    <title>Exploiting Gource</title>
    <description>Improvised code review of the Gource git repository viewer. It is meant as a way to show how one can perform quick and targeted code reviews.</description>
    <link>https://breakpoint.purrfect.fr/article/exploiting_gource.html</link>
    <pubDate>Sat, 25 Feb 2017 01:37:33 +0100</pubDate>
  </item>


  <item>
    <title>Let's build an Object System!</title>
    <description>What makes an object system tick? What does it mean to be object oriented? What are classes really?</description>
    <link>https://breakpoint.purrfect.fr/article/object_system.html</link>
    <pubDate>Sat, 25 Feb 2017 01:37:33 +0100</pubDate>
  </item>


  <item>
    <title>Mail.local et TOCTTOU</title>
    <description>Une explication détaillée d'exploitation de programme SUID root via une TOCTTOU pour obtenir une élévation de privilège.</description>
    <link>https://breakpoint.purrfect.fr/article/mail_local_tocttou.html</link>
    <pubDate>Sat, 25 Feb 2017 00:52:02 +0100</pubDate>
  </item>


  <item>
    <title>Comment who fonctionne-t-il ?</title>
    <description>Strace est un outil puissant mais qui peut être difficile à manipuler. Nous voyons donc un cas concret en étudiant le fonctionnement de la commande "who".</description>
    <link>https://breakpoint.purrfect.fr/article/strace_who.html</link>
    <pubDate>Sat, 25 Feb 2017 01:37:33 +0100</pubDate>
  </item>


  <item>
    <title>Puppy writeup</title>
    <description>Quelqu'un sur irc a proposé hier un petit challenge de steganographie. La victime du jour ? Un chiot qui renferme, nous dit-on, des secrets.</description>
    <link>https://breakpoint.purrfect.fr/article/puppy_writeup.html</link>
    <pubDate>Sat, 25 Feb 2017 01:52:33 +0100</pubDate>
  </item>


  <item>
    <title>Introduction à l'éditeur de texte ed</title>
    <description>Ed est un éditeur puissant mais terriblement déconcertant au premier abord. Cet article présente les commandes essentielles et un peu plus pour bien débuter avec l'Éditeur.</description>
    <link>https://breakpoint.purrfect.fr/article/introduction_ed.html</link>
    <pubDate>Sat, 25 Feb 2017 01:37:33 +0100</pubDate>
  </item>


  <item>
    <title>Shell streams and redirections</title>
    <description>Shell streams are the most powerful feature of bash. Knowing about redirections is a capital step toward an efficient use of command-line.</description>
    <link>https://breakpoint.purrfect.fr/article/shell_streams_and_redirections.html</link>
    <pubDate>Sat, 25 Feb 2017 01:37:33 +0100</pubDate>
  </item>


</channel>
</rss>

