Blog

Hitb-ctfchallenge
Mifare CTF challenge write up

During HiTB CTF one of the challenges were to decode a Mifare clasic handshake and find the encrypted message based on a communication trace. Fair and LovelyThis seems like a communication log. Can.

physicalsecurity
How to hack an Access Control System?

Physical security is one of the key elements in Security besides the human and technology part. The three elements basically linked together in an equal manner where hackers always try to find an.

email_spam-1414066
Securing unused domains

A lot of companies have reserved more than one domain name for their organization. Multiple of those domain name are not been used for email purpose but are a target for hackers to.

data recovery
Mounting filesystem image with CLI

Assume you have a image of an file system that needs to be mounted. This could be on a linux system in case you need to recovering data or for forensics reasons. With.

250gb_2.5inch_sata_harddisk_7200rpm_hardware4sale
Realtime LVM filesystem resize

Sometimes you need to resize your partition of your VPS system when you for example requested additional diskspace. In the below tutorial I resized my VPS hard-disk. Keep in mind that having a.

hacker
Effectieve scope voor penetratie testen

Vaak wordt door organisaties het bepalen van de scope voor een penetratie test onderschat. Het niet juist scopen van een opdracht kan resulteren in bijvoorbeeld een niet volledige test of dat er onvoldoende.

Screenshot 2020-07-03 at 16.40.31
How to build an API with Django REST Framework within 30 minutes

In this blog post, I will introduce how to develop a API Service in Django using Django REST Framework (DRF). In this example you will be introduced to DRF with minimal amount of.

Screenshot 2020-05-27 at 08.35.22
Fail2Ban log monitoring and blocking application

Lot’s of systems on the internet are been hacked trough the use of easy guessable passwords or default credentials. In many cases the source ip address is been hacked the same way. Attackers.

remove-code-signing
Securing WordPress with .htaccess
Hoe je wordpress website beveiligen met .htaccess tegen aanvallers. Met een aantal simpele filter technieken kan je aanvallers op afstand houden..