When working remotely (i.e. away from home) I often think about how it would be great if I could open up some of my internal projects when I have spare time and carry on working on them. There are multiple options on how I could do this, some are costly (moving environment to cloud) and … Continue reading SOCKS Proxy (Linux)
Category: Security
Security: MAC Address and ARP (Notes)
Every network interface controller (NIC) has a Media Access Control (MAC) address which is unique to the interface. A device may have multiple network interfaces (e.g., a ethernet network interface and a wireless network interface) and will a MAC address for each interface (e.g., a Rasperry Pi 4 has one MAC address for the ethernet … Continue reading Security: MAC Address and ARP (Notes)
Hacking: The Art of Exploitation – Book Review (Security)
Hacking: The Art Of Exploitation (2nd Edition) was released back in 2008, written by Jon Erickson and published by No Starch Press. I originally received a copy as part of a Humble Bundle and purchased physical copy in 2019 (19th printing!), off the bat that should show how much I enjoy this book. The book … Continue reading Hacking: The Art of Exploitation – Book Review (Security)
Security: Symmetric / Asymmetric Encryption (Notes)
Symmetric encryption uses the same key to encrypt and decrypt information. Symmetric encryption is generally faster than asymmetric encryption. However, it has the issue of finding a secure method of sharing the key (e.g., password) for the encryption so that it may be used. Symmetric encryption includes: Block ciphers such as AES (Advanced Encryption Standard), … Continue reading Security: Symmetric / Asymmetric Encryption (Notes)
Security: OWASP Top Ten (Notes)
The Open Web Application Security Project (OWASP) provides a top ten security risks in web applications at https://owasp.org/www-project-top-ten/ . The ranking of risks can help developers (and organisations) make their applications more secure. The 2021 OWASP Top Ten Broken Access ControlCryptographic FailuresInjectionInsecure DesignSecurity MisconfigurationVulnerable and Outdated ComponentsIdentification and Authentication FailuresSoftware and Data Integrity FailuresSecurity Logging … Continue reading Security: OWASP Top Ten (Notes)
Security: Risk Assessment (Notes)
The National Institute of Standards and Technology (NIST) produced the NIST Special Publication (SP) 800-30 to help conduct risk assessments. A risk is where a threat intersects with vulnerability, e.g. where a vulnerability exists and is used by a threat. Threat sources can come in many forms such as: Adversarial e.g., individuals, groups, organisations and … Continue reading Security: Risk Assessment (Notes)
Storing Data In The Cloud
The cloud offers many services for storing data which can be a double edged sword. In this blog post I am looking at some of the considerations that should be looked at before any data is moved into a cloud environment. Know Your Data The amount of data that you have may be staggering as … Continue reading Storing Data In The Cloud
Using A Raspberry Pi As A Syslog-ng Server (Raspberry Pi)
After many years of using my ISPs provided router I have finally upgraded to a higher spec router which has several features the ISP provided one did not. One of these features is the option to send logs from the router to a syslog server. For this project I am going to use this router … Continue reading Using A Raspberry Pi As A Syslog-ng Server (Raspberry Pi)
Python and nmap: Controlling The Output (Python)
In my previous post I looked at the ways of using nmap and Python to scan hosts, and in this post I am going to look at outputting the results. But first a public service announcement: DO NOT USE THE BELOW INFORMATION TO ATTACK, MONITOR OR BREAK INTO ANY COMPUTER / NETWORK / DEVICE THAT … Continue reading Python and nmap: Controlling The Output (Python)
Python and nmap: Scanning For Hosts (Python)
nmap is a powerful software tool that can be used to scan a network for hosts, see what ports they have open and even try to identify what operating system the hosts have running. I previously created a basic port scanner in Python, but in this blog post I am going to look at using … Continue reading Python and nmap: Scanning For Hosts (Python)
You must be logged in to post a comment.