<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberSecurity on t0o0tz.com</title>
    <link>/categories/cybersecurity/</link>
    <description>Recent content in CyberSecurity on t0o0tz.com</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>zh-cn</language>
    <copyright>©2021 t0o0tz.com</copyright>
    <lastBuildDate>Thu, 20 Apr 2023 00:00:00 +0000</lastBuildDate>
    
        <atom:link href="/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Asymmetric Key Cryptography (And Hashes)</title>
      <link>/posts/post0x0009/</link>
      <pubDate>Thu, 20 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/post0x0009/</guid>
      <description>Asymmetric Key Cryptography Asymmetric key cryptography (aka public key cryptography) is the concept of using a public and private key to encrypt and decrypt data. The public and private keys are linked mathematically. In asymmetric cryptography both Steve and Meg will use their own unique private keys to encrypt a message.
In the example below Meg uses Steve’s public key to encrypt a message for Steve’s eyes only. Once Steve receives the message he can decrypt by using his private key.</description>
    </item>
    
    <item>
      <title>Symmetric Key Cryptography at a Glance</title>
      <link>/posts/post0x0008/</link>
      <pubDate>Thu, 31 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/post0x0008/</guid>
      <description>Symmetric Key Cryptography Cryptography is very, very complex… As it should be. It keeps us and our data safe and secure.
This write-up will provide an overview of Symmetric Key Cryptography
Cryptography - What&amp;rsquo;s The Point? There are many use cases for cryptography, but the most obvious is confidentiality. We want to ensure our private data remains private. Simple as that.
Cryptography can also be used to ensure integrity, Nonrepudiation, and authentication</description>
    </item>
    
    <item>
      <title>Using Favicon Hashing for Continuous Monitoring</title>
      <link>/posts/post0x0006/</link>
      <pubDate>Sun, 25 Oct 2020 00:00:00 +0000</pubDate>
      
      <guid>/posts/post0x0006/</guid>
      <description>CONTINUOUS MONITORING FOR CONTROLS &amp;amp; VULNERABILITIES - DANIEL MIESSLER
I started listening to the Cloud Security Podcast this past month. Great digestible interviews with security professionals from different fields. This episode really caught my attention when they discussed bug bounty hunters using a continuous monitoring technique involving favicon hashes.
What&amp;rsquo;s a favicon: A favicon is the tiny logo you see in the tab section of your browser. For instance you should (if on a desktop browser) see this little egg  next to the title of this page.</description>
    </item>
    
    <item>
      <title>Linux Privilege Escalation with LinEnum</title>
      <link>/posts/post0x0004/</link>
      <pubDate>Wed, 27 May 2020 00:00:00 +0000</pubDate>
      
      <guid>/posts/post0x0004/</guid>
      <description>Linux privilege escalation can be a weak point for many penetration testers. Scripts such as LinEnum have attempted to make the process of finding an attack vector easier; However, it can be hard to digest the results if you don&amp;rsquo;t know what to look for. Below are my notes on uploading the LinEnum.sh script to a remote machine, running the script, and reading the results.
DISCLAIMER - I used a retired HTB machine (OpenAdmin) as my remote victim machine.</description>
    </item>
    
    <item>
      <title>Attacking Kerberos W/ AS-REP Roasting</title>
      <link>/posts/post0x0003/</link>
      <pubDate>Tue, 14 Apr 2020 00:00:00 +0000</pubDate>
      
      <guid>/posts/post0x0003/</guid>
      <description>What is Kerberos Kerberos, developed by MIT, is a network authentication protocol used in Active Directory most commonly running on port 88 with password management on port 464.
The Kerberos protocol enables a client/user to identify itself to a server (and vice versa) across a network - thus providing strong authentication. However, Kerberos does not Authorize which services the client/user can access (this is normally done by LDAP).
Prerequisites  Kali Linux Impacket  Grab the latest stable release, unpack it and run &amp;lsquo;pip install .</description>
    </item>
    
  </channel>
</rss>