<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

 <title>Aurélien Duboc</title>
 <link href="/atom.xml" rel="self"/>
 <id></id>
 <updated>2026-02-21T10:50:08+00:00</updated>
 <author>
   <name>Aurélien Duboc</name>
   <uri>https://www.duboc.xyz</uri>
   <email>aurelien@duboc.xyz</email>
 </author>

 

 <entry>
   <title>EN - Prometheus: Outscale VM service discovery (new feature)</title>
   <link href="/prometheus-outscale-vm-service-discovery"/>
   <id>/prometheus-outscale-vm-service-discovery</id>
   <updated>2026-02-21T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;Prometheus can discover scrape targets from cloud APIs (EC2, Azure, GCE, etc.). This post describes a new discovery integration for &lt;strong&gt;Outscale Cloud&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;outscale_sd_configs&lt;/code&gt;, contributed upstream.&lt;/p&gt; &lt;/blockquote&gt; &lt;h1 id=&quot;what-is-outscale&quot;&gt;What is Outscale?&lt;/h1&gt; &lt;p&gt;&lt;a href=&quot;https://outscale.com/&quot;&gt;Outscale&lt;/a&gt; is a cloud provider offering an AWS-compatible API (among others). If you run workloads on...</content>
 </entry>

 

 <entry>
   <title>EN - Prometheus AWS EC2 service discovery: fixing the custom endpoint (regression fix)</title>
   <link href="/prometheus-ec2-sd-endpoint-fix"/>
   <id>/prometheus-ec2-sd-endpoint-fix</id>
   <updated>2026-02-21T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;After the migration to AWS SDK v2, Prometheus AWS EC2 service discovery stopped applying the configured &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;endpoint&lt;/code&gt; option. This post summarizes the regression and the fix contributed upstream.&lt;/p&gt; &lt;/blockquote&gt; &lt;h1 id=&quot;context&quot;&gt;Context&lt;/h1&gt; &lt;p&gt;Prometheus &lt;a href=&quot;https://prometheus.io/docs/prometheus/latest/configuration/configuration/#ec2_sd_config&quot;&gt;EC2 service discovery&lt;/a&gt; lets you discover scrape targets from AWS EC2. Some setups use...</content>
 </entry>

 

 <entry>
   <title>EN - Carrefour internal CTF (31/10/2025) - vulnerability themes</title>
   <link href="/carrefour-ctf-vulnerabilities"/>
   <id>/carrefour-ctf-vulnerabilities</id>
   <updated>2025-10-31T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;CarrefourTheFlag 2025 (C4CTF) was an internal Capture The Flag run in late October 2025, with 102 participants. This post summarises the &lt;strong&gt;vulnerability types&lt;/strong&gt; that appeared in the more advanced challenges and illustrates them with &lt;strong&gt;generic&lt;/strong&gt; examples. It is not a write-up or solution guide.&lt;/p&gt; &lt;/blockquote&gt; &lt;h1 id=&quot;context&quot;&gt;Context&lt;/h1&gt; &lt;p&gt;The CTF...</content>
 </entry>

 

 <entry>
   <title>EN - Velero disaster recovery: pre-hooks and post-hooks for application-consistent backups</title>
   <link href="/velero-disaster-recovery-pre-post-hooks"/>
   <id>/velero-disaster-recovery-pre-post-hooks</id>
   <updated>2024-06-12T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;In 2024 I spent a lot of time on disaster recovery (DR) for Kubernetes, mainly with &lt;a href=&quot;https://velero.io/&quot;&gt;Velero&lt;/a&gt;. Getting backups that are safe to restore for stateful apps (databases, queues) means making them &lt;strong&gt;application-consistent&lt;/strong&gt;. Velero’s pre-hooks and post-hooks are the right tool for that. This post sums up how...</content>
 </entry>

 

 <entry>
   <title>EN - Filecoin ecosystem: Lotus miner, Farcaster, and CID Gravity</title>
   <link href="/filecoin-ecosystem-lotus-cid-gravity"/>
   <id>/filecoin-ecosystem-lotus-cid-gravity</id>
   <updated>2023-08-22T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;In 2023 I worked in the &lt;a href=&quot;https://filecoin.io/&quot;&gt;Filecoin&lt;/a&gt; ecosystem, mainly around &lt;a href=&quot;https://github.com/filecoin-project/lotus&quot;&gt;Lotus&lt;/a&gt; (miner and node) and tooling for storage providers. This post is a short overview of that context and of &lt;a href=&quot;https://www.cidgravity.com/&quot;&gt;CID Gravity&lt;/a&gt;, a gateway and management layer that makes it easier to work with Filecoin storage...</content>
 </entry>

 

 <entry>
   <title>EN - Re-parenting processes to a new terminal with reptyr</title>
   <link href="/reptyr"/>
   <id>/reptyr</id>
   <updated>2023-03-25T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;Reptyr lets you move a running process (e.g. started in one SSH session or terminal) into another terminal or into tmux/screen, without stopping it. Useful when you forget to start a long job inside tmux, or when you need to hand off a process to another session.&lt;/p&gt; &lt;/blockquote&gt; &lt;h1...</content>
 </entry>

 

 <entry>
   <title>FR - Writeup - HackSecuReims 2022</title>
   <link href="/hsr-2022"/>
   <id>/hsr-2022</id>
   <updated>2022-03-15T00:00:00+00:00</updated>
   <content type="html">&lt;h1 id=&quot;---sommaire--&quot;&gt;– – Sommaire – –&lt;/h1&gt; &lt;ul&gt; &lt;li&gt;&lt;a href=&quot;#reverse-infinitecrackme-1&quot;&gt;[Reverse] InfiniteCrackme 1&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#reverse-infinitecrackme-2&quot;&gt;[Reverse] InfiniteCrackme 2&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#misc-oneliner&quot;&gt;[Misc] Oneliner&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#programming-mathematician&quot;&gt;[Programming] Mathematician&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#web-werkzeug-fuzzing-1&quot;&gt;[Web] Werkzeug Fuzzing 1&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#web-werkzeug-fuzzing-2&quot;&gt;[Web] Werkzeug Fuzzing 2&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;#web-werkzeug-fuzzing-3&quot;&gt;[Web] Werkzeug Fuzzing 3&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt; &lt;hr /&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt; &lt;h1 id=&quot;reverse-infinitecrackme-1&quot;&gt;[Reverse] InfiniteCrackme 1&lt;/h1&gt; &lt;h2 id=&quot;source-de-téléchargement&quot;&gt;Source de...</content>
 </entry>

 

 <entry>
   <title>EN - Kubernetes service accounts for Vault CSI with Confluent Helm charts</title>
   <link href="/confluent-helm-vault-csi-service-accounts"/>
   <id>/confluent-helm-vault-csi-service-accounts</id>
   <updated>2021-11-17T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;When using the Vault CSI driver to inject secrets or certificates into pods, each pod needs a dedicated Kubernetes service account. This post describes a contribution to Confluent’s Kafka Helm charts to make those service accounts configurable.&lt;/p&gt; &lt;/blockquote&gt; &lt;h1 id=&quot;context&quot;&gt;Context&lt;/h1&gt; &lt;p&gt;The &lt;a href=&quot;https://developer.hashicorp.com/vault/docs/platform/k8s/csi&quot;&gt;Vault CSI provider&lt;/a&gt; lets Kubernetes pods get...</content>
 </entry>

 

 <entry>
   <title>EN - Introduction to Hacking Android</title>
   <link href="/introduction-to-hacking-android"/>
   <id>/introduction-to-hacking-android</id>
   <updated>2020-11-10T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;This article might help you to reverse Android application and access new features upon it. I disclaim any liability if you use this article for illegal actions.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;&lt;em&gt;Thanks &lt;a href=&quot;https://twitter.com/cyxo_o&quot;&gt;@cyxo_o&lt;/a&gt; for helping me on this&lt;/em&gt;&lt;/p&gt; &lt;h1 id=&quot;live-presentation-on-twitch&quot;&gt;Live presentation on Twitch&lt;/h1&gt; &lt;iframe width=&quot;100%&quot; height=&quot;378&quot; src=&quot;https://www.youtube.com/embed/uybsqPEnSd4&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write;...</content>
 </entry>

 

 <entry>
   <title>EN - Root-Me API: dealing with 429 rate limits when there was no public API</title>
   <link href="/rootme-api-429-rate-limits"/>
   <id>/rootme-api-429-rate-limits</id>
   <updated>2020-05-15T00:00:00+00:00</updated>
   <content type="html">&lt;blockquote&gt; &lt;p&gt;&lt;a href=&quot;https://www.root-me.org/&quot;&gt;Root-Me&lt;/a&gt; is a platform for security challenges and CTF. At the time this project was built, &lt;strong&gt;there was no official public API&lt;/strong&gt;. I wrote an unofficial API (&lt;a href=&quot;https://github.com/zteeed/Root-Me-API&quot;&gt;Root-Me-API&lt;/a&gt;) that exposed user stats, challenges, and scores. The main difficulty was dealing with &lt;strong&gt;rate-limiting&lt;/strong&gt; on the server side (HTTP...</content>
 </entry>

 

</feed>