Blogs


Have you ever attempted to exfiltrate binary data using just your phone's camera?

Discussing security concerns with top management can be a challenging task, sometimes even more difficult than overcoming technical challenges.
A few months ago, I had an intriguing discussion with C-level executives to persuade them to ban electronic devices in some sensitive areas of the company.
I needed to convince the management that it was possible to steal data even if it was encrypted and stored as binary on a computer, without any possibility of exfiltration over the network, USB, or other means.
Since the most effective way to convince them was to demonstrate what I was defending, I requested a few days to show how protected data could be exfiltrated. My goal was to exfiltrate 5MB of encrypted data using only a phone camera and decrypt it offline.

Read More ...

How secure is your digital wallet? A security assessment of major e-wallet applications in Mauritania.

Mauritania has recently experienced incredible growth in digital payment solutions (ewallets). At TIDUM, we consider evaluating these applications from a security perspective as a public service for the consumers and developers behind these applications. Our main motivation is to increase consumer confidence in these solutions and to help developers improve the quality of their solutions. From a selfish point of view, these kinds of assessments are an intellectual exercise that we enjoy as security researchers.

Read More ...

How To Use Nmap, a basic tutorial

Nmap is a network mapping tool which is one of the most popular free network discovery tools. Nmap is one of the main tools used by network administrators to create a map of their networks. It can be used to find active hosts on a network, perform port scanning, operating system detection, and version detection. In this guide, we’ll see what Nmap is, what it can do, and explain how to use the most common options.

Read More ...

Get In Touch with us!