#NSEC

2025-05-18

Today we will announce the big winners of our CTF! Stay tuned, we should post around 4pm

#nsec #nsec2025 #infosec #hackerspace #ctf

2025-05-16

Pas qu'on veut vous faire regretter de ne pas être des nôtres... quoique! 🥳

Photos du party de Northsec 2025

#nsec2025 #nsec #infosec #hackerspace

Notre DJ BarbadaLe partyDanseuse de feuJoueurs de poches
2025-05-16

Not to give you FOMO but a little bit... 🥳

Picture of our party at Northsec 2025

#nsec #hackerspace #infosec #party

Our DJ BarbadaParty!Fire dancerParticipants playing games
2025-05-13

✨ STUDENT CONFERENCE TICKET DRAW ✨

Our sponsor Google is giving away 4 student tickets to our conferences starting this Thursday.

To enter: share this post and mention which conference you'd most like to attend.

Winners will be announced tonight!

#students #montreal #hacker #infosec #nsec

Win tickets for Nsec 2025
Pen Test PartnersPTP@infosec.exchange
2025-03-04

Did you know your DNS security could accidentally leak your entire subdomain structure? Enter DNSSEC with NSEC/NSEC3 records, which is great for ensuring integrity and authentication but can also be a sneaky way for attackers to ‘zone walk’ and enumerate your domains...

Darrell Hall breaks it down in our latest blog post: pentestpartners.com/security-b

What's covered:
• How NSEC/NSEC3 can inadvertently expose DNS data
• The difference between zone transfers and zone walking
• How to crack NSEC3 records (and why you should care)
• Real-world examples and mitigation strategies

#DNSSEC #CyberSecurity #Infosec #DNS #NSEC #NSEC3 #ZoneWalking #ThreatIntel

2024-06-06

@polysecure J'adore les deux épisodes sur le #nsec ! Ça me donne encore plus hâte à l'an prochain.

2024-05-19

#nsec is over, once again it was amazing! Thanks to everyone involved in making it possible. You all rock! The conference and CTF were awesome, I had a great time through it all.

And I'm very proud that my team finished 9th in the CTF. The competition for that top 10 is fierce for that top 10.

I already have my ticket for next year. I'm looking forward to it.

becojobecojo
2024-05-15

catch us tomorrow morning at @NorthSec for an overview on finding vulnerable GitHub Actions workflows in open-source projects at scale, ways of living in a pipeline, and a new SAST tool to analyze CI workflows!

2024-05-15

#nsec is tomorrow!!!! I'm really excited.

2024-05-15

I'll be speaking about #Nim #malware and my Stockholm-syndromy relationship tomorrow, May 16th 14:30 at #NSec. There's a nice title card and all!
+ check out Nimfilt, the #IDA plugin I created ('cause if you do, I can justify working on this kind of tool on company time😁)
github.com/eset/nimfilt

A blue and black title card announcing a talk called "Reverse-Engineering Nim Malware: Or a brief tale of analyzing the compiler for a language I had never used" on May 16 at 2:30 PM. 
The Nsec logo in in the upper left corner. On the right is black and white picture of me, the speaker, with the name Alexandre Côté below it.
2024-05-12

The next few days should be awesome. We have our internal conference at work this week. I'll miss the last two days because I'll be at the #nsec conference and CTF. And after that, if I still have have some energy left, I'll try a few challenges in the #HackTheBox Business CTF.

So much learning. I think my brain will explode. It will be fun.

2024-04-30

Our preciouses just arrived 😍
IT'S GETTING REAL!

*****
Nos précieuses viennent d'arriver 😍
ON SE VOIT TRÈS BIENTÔT!

#NSec #BadgeLife #FlagBot 👀 🤭

⠵⠻⠷⠕⠭ 🍥🍉⚪🌹z3r0fox
2024-02-24

Finally I can secure my Eggos with deliciousness

It's a sample sized bottle of maple syrup from the "famille Bourque a St-Benoit-Labre" branded with the logo of PM Scada Cybersecurite with Eggos in a bowl behind
2024-01-19

I got my ticket for the #nsec conference and CTF. Early bird tickets are now available tickets.nsec.io/2024/

2023-11-20

R to @KadriSimson: 📜My full speech from the opening of the North Seas Energy Cooperation Ministerial #NSEC can be found here👇

ec.europa.eu/commission/pressc

🐦🔗: nitter.cz/KadriSimson/status/1

[2023-11-20 10:22 UTC]

2023-08-25

OK, I know a little about DNS but wildcards + #DNSSEC are out of my league. Nevertheless, I'm pretty confident that this TYPE65283 shenanigans Cloudflare is using in its #NSEC RR does not come from the RFCs 🤔

$ dig prout.cloudflare.com +dnssec
...
;; AUTHORITY SECTION:
prout.cloudflare.com. 3600 IN NSEC \000.prout.cloudflare.com. RRSIG NSEC TYPE65283

Im sorry for the delay but we finally released the code for the @NorthSec CTF badge.
🔗 github.com/nsec/nsec-badge/
#nsec #badgelife

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst