This commit is contained in:
Joren 2025-05-31 02:09:14 +02:00
parent d03b4e171e
commit 0b11bc65d8
Signed by: Joren
GPG Key ID: 280E33DFBC0F1B55
238 changed files with 302 additions and 420497 deletions

View File

@ -29,17 +29,17 @@ Once clients start resolving names through the attacker's DNS, the attacker can
Tools like `ntlmrelayx` allow relaying to:
* **SMB**: for file access, command execution, or dumping secrets via `secretsdump.py`
* **LDAP/LDAPS**: to enumerate AD users, modify objects, or create backdoor accounts
* **HTTP/WSMAN**: to access internal web apps or trigger remote code execution
* SMB: for file access, command execution, or dumping secrets via `secretsdump.py`
* LDAP/LDAPS: to enumerate AD users, modify objects, or create backdoor accounts
* HTTP/WSMAN: to access internal web apps or trigger remote code execution
The success of the relay depends on the targets configuration. If SMB signing or LDAP channel binding is enforced, the relay will fail. But in many networks, it isnt.
#### Realistic Attack Chain
1. **Launch mitm6** to poison IPv6 and become DNS for the subnet.
2. **Run ntlmrelayx** with appropriate targets (e.g., `--smb2support --target smb://10.0.0.5`).
3. **Wait**: a victim resolves an internal name (e.g., `fileshare`), the attacker responds.
1. Launch mitm6 to poison IPv6 and become DNS for the subnet.
2. Run ntlmrelayx with appropriate targets (e.g., `--smb2support --target smb://10.0.0.5`).
3. Wait: a victim resolves an internal name (e.g., `fileshare`), the attacker responds.
4. The client connects to the attacker thinking its the fileshare and sends NTLM credentials.
5. `ntlmrelayx` relays these to the actual target server.
6. If successful, the attacker gains authenticated access.
@ -50,9 +50,9 @@ In parallel, `Responder` can be used for LLMNR/NBT-NS-based interception in IPv4
This isn't new, but it's often neglected. To prevent these attacks:
* Disable **LLMNR** and **NBT-NS** via Group Policy.
* Disable **IPv6** on clients if it's not explicitly required.
* Enforce **SMB signing** and **LDAP channel binding**.
* Disable LLMNR and NBT-NS via Group Policy.
* Disable IPv6 on clients if it's not explicitly required.
* Enforce SMB signing and LDAP channel binding.
* Segment your network to reduce the blast radius.
* Prefer **Kerberos** authentication over NTLM where possible.
* Monitor for rogue IPv6 RAs and anomalous name resolution.

View File

@ -14,7 +14,6 @@
"figure",
"footer",
"form",
"g",
"h1",
"h2",
"h3",
@ -32,12 +31,10 @@
"main",
"meta",
"nav",
"notice",
"ol",
"p",
"path",
"picture",
"polygon",
"pre",
"script",
"section",
@ -49,7 +46,6 @@
"table",
"tbody",
"td",
"text",
"textarea",
"th",
"thead",
@ -79,7 +75,6 @@
"caption-Picture-of-the-solution",
"caption-SARV001-Kanji",
"caption-SARV001-Lume",
"caption-SARV001-Lume-whilst-changing-day",
"card",
"card-body",
"card-btn",
@ -150,7 +145,6 @@
"gap-3",
"gap-4",
"gap-5",
"goat",
"gx-md-5",
"gx-xxl-5",
"gy-4",
@ -177,6 +171,7 @@
"list-inline",
"list-inline-item",
"mb-0",
"mb-1",
"mb-2",
"mb-3",
"mb-4",
@ -217,6 +212,8 @@
"pe-3",
"position-fixed",
"position-relative",
"post-categories",
"post-date",
"post-meta",
"progress",
"progress-bar",
@ -247,7 +244,6 @@
"section-title",
"small",
"social-links",
"svg-container",
"text-capitalize",
"text-center",
"text-lg-center",
@ -277,14 +273,11 @@
"caption-Picture of the solution",
"caption-SARV001 Kanji",
"caption-SARV001 Lume",
"caption-SARV001 Lume whilst changing day",
"capturing-vs-relaying",
"caveats--limitations",
"cheap-camera-expensive-risk-hacking-an-iot-ptz-camera",
"contact",
"creating-the-hugo-site",
"customization",
"cyber-defence-on-the-digital-frontline-a-mission-with-nato",
"de-praktijk-vs-certificaten",
"defending-in-the-digital-age",
"delegation-more-trust-more-problems",
@ -308,15 +301,11 @@
"ipv6-enabled-by-default-forgotten-by-admins",
"irc-ngircd",
"kerberoasting-plaintext-passwords-in-disguise",
"kerberos-under-siege-abusing-the-trust-backbone-of-windows-domains",
"kwetsbaarheden-in-active-directory",
"lastName",
"leading-with-innovation",
"lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux",
"let-me-know-if-youd-like-to-plug-this-directly-into-the-markdown-file-or-add-screenshotsterminal-views",
"limitations-and-workarounds",
"making-it-stick-lbu",
"matrix-building-a-decentralized-communication-future",
"matrix-in-cybersecurity-contexts",
"message",
"mitigation",
@ -332,25 +321,18 @@
"real-world-examples",
"real-world-usage",
"realistic-attack-chain",
"red-team-talk-een-blik-achter-de-schermen-bij-offensive-security",
"repository",
"resume",
"reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience",
"runlevel-integration",
"running-your-own-homeserver",
"sample-home-setup",
"securing-cyberspace-belgian-cyber-command-at-howest",
"security-end-to-end-encryption-by-default",
"seiko-sarv001-the-jdm-sleeper-that-punches-above-its-weight",
"sidebarContent",
"silent-interception-exploiting-llmnr-nbt-ns-mdns-and-ipv6-in-modern-networks",
"skill",
"the-black-team-rapid-response-in-action",
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
"the-developer-angle",
"the-exercise-locked-shields",
"the-one-that-got-away-tls-fingerprinting",
"the-smart-home-trap-isolate-or-be-owned",
"ticket-forgery-and-impersonation",
"toggler",
"tools-tips-en-oefenen",

View File

@ -1,88 +0,0 @@
##### Optimize default expiration time - BEGIN
<IfModule mod_expires.c>
## Enable expiration control
ExpiresActive On
## CSS and JS expiration: 1 week after request
ExpiresByType text/css "now plus 1 week"
ExpiresByType application/javascript "now plus 1 week"
ExpiresByType application/x-javascript "now plus 1 week"
## Image files expiration: 1 month after request
ExpiresByType image/bmp "now plus 1 month"
ExpiresByType image/gif "now plus 1 month"
ExpiresByType image/jpeg "now plus 1 month"
ExpiresByType image/webp "now plus 1 month"
ExpiresByType image/jp2 "now plus 1 month"
ExpiresByType image/pipeg "now plus 1 month"
ExpiresByType image/png "now plus 1 month"
ExpiresByType image/svg+xml "now plus 1 month"
ExpiresByType image/tiff "now plus 1 month"
ExpiresByType image/x-icon "now plus 1 month"
ExpiresByType image/ico "now plus 1 month"
ExpiresByType image/icon "now plus 1 month"
ExpiresByType text/ico "now plus 1 month"
ExpiresByType application/ico "now plus 1 month"
ExpiresByType image/vnd.wap.wbmp "now plus 1 month"
## Font files expiration: 1 month after request
ExpiresByType application/x-font-ttf "now plus 1 month"
ExpiresByType application/x-font-opentype "now plus 1 month"
ExpiresByType application/x-font-woff "now plus 1 month"
ExpiresByType font/woff2 "now plus 1 month"
ExpiresByType image/svg+xml "now plus 1 month"
## Audio files expiration: 1 month after request
ExpiresByType audio/ogg "now plus 1 month"
ExpiresByType application/ogg "now plus 1 month"
ExpiresByType audio/basic "now plus 1 month"
ExpiresByType audio/mid "now plus 1 month"
ExpiresByType audio/midi "now plus 1 month"
ExpiresByType audio/mpeg "now plus 1 month"
ExpiresByType audio/mp3 "now plus 1 month"
ExpiresByType audio/x-aiff "now plus 1 month"
ExpiresByType audio/x-mpegurl "now plus 1 month"
ExpiresByType audio/x-pn-realaudio "now plus 1 month"
ExpiresByType audio/x-wav "now plus 1 month"
## Movie files expiration: 1 month after request
ExpiresByType application/x-shockwave-flash "now plus 1 month"
ExpiresByType x-world/x-vrml "now plus 1 month"
ExpiresByType video/x-msvideo "now plus 1 month"
ExpiresByType video/mpeg "now plus 1 month"
ExpiresByType video/mp4 "now plus 1 month"
ExpiresByType video/quicktime "now plus 1 month"
ExpiresByType video/x-la-asf "now plus 1 month"
ExpiresByType video/x-ms-asf "now plus 1 month"
</IfModule>
##### Optimize default expiration time - END
##### 1 Month for most static resources
<filesMatch ".(css|jpg|jpeg|png|webp|gif|js|ico|woff|woff2|eot|ttf)$">
Header set Cache-Control "public, max-age=31536000, immutable"
</filesMatch>
##### Enable gzip compression for resources
<ifModule mod_gzip.c>
mod_gzip_on Yes
mod_gzip_dechunk Yes
mod_gzip_item_include file .(html?|txt|css|js|php)$
mod_gzip_item_include handler ^cgi-script$
mod_gzip_item_include mime ^text/.*
mod_gzip_item_include mime ^application/x-javascript.*
mod_gzip_item_exclude mime ^image/.*
mod_gzip_item_exclude rspheader ^Content-Encoding:.*gzip.*
</ifModule>
##### Or, compress certain file types by extension:
<FilesMatch ".(html|css|jpg|jpeg|webp|png|gif|js|ico)">
SetOutputFilter DEFLATE
</FilesMatch>
##### Set Header Vary: Accept-Encoding
<IfModule mod_headers.c>
<FilesMatch ".(js|css|xml|gz|html)$">
Header append Vary: Accept-Encoding
</FilesMatch>
</IfModule>

File diff suppressed because one or more lines are too long

View File

@ -1,153 +0,0 @@
---
title: Home | Joren
description: ''
# banner
banner:
greeting: "Hi there!"
title: "I'm **Joren Schipman**"
image: "images/hero-image.png"
designation: "Student Applied Computer Science"
institution: "Howest University of Applied Sciences"
description: "A professor of artificial intelligence at the Stanford AI Lab. I research interests include distributed robotics, mobile computing and programmable matter."
additional_info:
- title: "Email"
content: "jorenschipman@gmail.com"
- title: "Phone"
content: "+32456069255"
- title: "Age"
content: "21 years"
- title: "Languages"
content: "Dutch, English"
- title: "Address"
content: "Kapelseweg 58a, 2811 Mechelen"
button:
enable: true
label: "Download Resume"
isDownloadable: true
link: "#?"
# skill
skill:
enable: true
title: "My **Skills**"
skills:
- title: "Playing Science"
percentage: "95"
- title: "Arts And Craft"
percentage: "90"
- title: "Creative Writing"
percentage: "55"
- title: "English Lessons"
percentage: "95"
- title: "SQL"
percentage: "80"
- title: "Mongodb"
percentage: "95"
- title: "Tableau"
percentage: "75"
- title: "Stella Architect"
percentage: "90"
# experience
experience:
enable: true
title: "Experiences"
experience_list:
- title: "University of Eastern Finland"
duration: "Jan 2022 Present"
company: "Rolling Thunder"
icon: "fa-solid fa-pen-ruler"
description: |
Maecenas tempus faucibus rutrum. Duis eu aliquam urna. Proin vitae nulla tristique, ornare felis id congue libero.
- title: "University of Jyväskylä"
duration: "Jan 2020 Dec 2021"
company: "Apple Inc."
icon: "fa-solid fa-palette"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "University of Eastern Finland"
duration: "Jan 2016 Dec 2019"
company: "Google Inc."
icon: "fa-solid fa-laptop-code"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
# education
education:
enable: true
title: "Education"
education_list:
- title: "PhD in Statistics"
duration: "Jan 2021 to Dec 2022"
icon: "fa-solid fa-building-columns"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "MSc in Statistics"
description: ""
institution: ""
duration: "Jan 2019 - Dec 2020"
icon: "fa-solid fa-person-chalkboard"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "BSc in Statistics"
description: ""
institution: ""
duration: "Jan 2019 - Dec 2020"
icon: "fa-solid fa-graduation-cap"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
# projects
projects:
enable: true
button:
link: "projects/"
label: "All Projects"
# blogs
blogs:
enable: true
button:
link: "blog/"
label: "All Blogs"
# contact
contact:
enable: true
title: "Get in Touch"
contact_info:
title: "Contact"
subtitle: "Fill up the form and our Team will get back to you within 24 hours."
contact_details:
- name: "Call"
icon: "fa-solid fa-phone-volume"
content: "[310-437-2766](tel:310-437-2766)"
- name: "Mail"
icon: "fa-solid fa-envelope"
content: "[williamson@gmail.com](mailto:williamson@gmail.com)"
- name: "Address"
icon: "fa-solid fa-location-dot"
content: "1901 Thornridge Cir. Shiloh, Hawaii"
- name: "Fax"
icon: "fa-solid fa-phone-volume"
content: "[555-123-4567](tel:555-123-4567)"
---

File diff suppressed because one or more lines are too long

View File

@ -1,82 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Recent Posts on Joren&#39;s Site</title>
<link>http://localhost:1313/blog/</link>
<description>Recent content in Recent Posts on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/blog/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>http://localhost:1313/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>http://localhost:1313/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>http://localhost:1313/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>http://localhost:1313/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>http://localhost:1313/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -1,11 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>\[&#34;Cybersecurity&#34;, &#34;Offensive&#34;, &#34;Windows&#34;] on Joren&#39;s Site</title>
<link>http://localhost:1313/categories/%5Ccybersecurity-offensive-windows/</link>
<description>Recent content in \[&#34;Cybersecurity&#34;, &#34;Offensive&#34;, &#34;Windows&#34;] on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<atom:link href="http://localhost:1313/categories/%5Ccybersecurity-offensive-windows/index.xml" rel="self" type="application/rss+xml" />
</channel>
</rss>

View File

@ -1,11 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>\[&#34;Self-Hosting&#34;, &#34;Networking&#34;, &#34;Alpine-Linux&#34;, &#34;Vpn&#34;, &#34;Dns&#34;] on Joren&#39;s Site</title>
<link>http://localhost:1313/categories/%5Cself-hosting-networking-alpine-linux-vpn-dns/</link>
<description>Recent content in \[&#34;Self-Hosting&#34;, &#34;Networking&#34;, &#34;Alpine-Linux&#34;, &#34;Vpn&#34;, &#34;Dns&#34;] on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<atom:link href="http://localhost:1313/categories/%5Cself-hosting-networking-alpine-linux-vpn-dns/index.xml" rel="self" type="application/rss+xml" />
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Alpine-Linux on Joren&#39;s Site</title>
<link>https://joren.blog/categories/alpine-linux/</link>
<description>Recent content in Alpine-Linux on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/alpine-linux/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Communication on Joren&#39;s Site</title>
<link>https://joren.blog/categories/communication/</link>
<description>Recent content in Communication on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/communication/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>CTF on Joren&#39;s Site</title>
<link>https://joren.blog/categories/ctf/</link>
<description>Recent content in CTF on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,68 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Cybersecurity on Joren&#39;s Site</title>
<link>http://localhost:1313/categories/cybersecurity/</link>
<description>Recent content in Cybersecurity on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>http://localhost:1313/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>http://localhost:1313/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>http://localhost:1313/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Decentralization on Joren&#39;s Site</title>
<link>http://localhost:1313/categories/decentralization/</link>
<description>Recent content in Decentralization on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/categories/decentralization/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Defense on Joren&#39;s Site</title>
<link>https://joren.blog/categories/defense/</link>
<description>Recent content in Defense on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/defense/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Dns on Joren&#39;s Site</title>
<link>https://joren.blog/categories/dns/</link>
<description>Recent content in Dns on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/dns/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Education on Joren&#39;s Site</title>
<link>https://joren.blog/categories/education/</link>
<description>Recent content in Education on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/education/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Event on Joren&#39;s Site</title>
<link>https://joren.blog/categories/event/</link>
<description>Recent content in Event on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/event/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Hardware on Joren&#39;s Site</title>
<link>https://joren.blog/categories/hardware/</link>
<description>Recent content in Hardware on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/hardware/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
</channel>
</rss>

View File

@ -1,2 +0,0 @@
<script>window.location.replace("\/");</script>

View File

@ -1,173 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Categories on Joren&#39;s Site</title>
<link>https://joren.blog/categories/</link>
<description>Recent content in Categories on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Alpine-Linux</title>
<link>https://joren.blog/categories/alpine-linux/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/alpine-linux/</guid>
<description></description>
</item>
<item>
<title>Communication</title>
<link>https://joren.blog/categories/communication/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/communication/</guid>
<description></description>
</item>
<item>
<title>Cybersecurity</title>
<link>https://joren.blog/categories/cybersecurity/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/cybersecurity/</guid>
<description></description>
</item>
<item>
<title>Decentralization</title>
<link>https://joren.blog/categories/decentralization/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/decentralization/</guid>
<description></description>
</item>
<item>
<title>Dns</title>
<link>https://joren.blog/categories/dns/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/dns/</guid>
<description></description>
</item>
<item>
<title>Hardware</title>
<link>https://joren.blog/categories/hardware/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/hardware/</guid>
<description></description>
</item>
<item>
<title>Iot</title>
<link>https://joren.blog/categories/iot/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/iot/</guid>
<description></description>
</item>
<item>
<title>Jdm</title>
<link>https://joren.blog/categories/jdm/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/jdm/</guid>
<description></description>
</item>
<item>
<title>Network</title>
<link>https://joren.blog/categories/network/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/network/</guid>
<description></description>
</item>
<item>
<title>Networking</title>
<link>https://joren.blog/categories/networking/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/networking/</guid>
<description></description>
</item>
<item>
<title>Offensive</title>
<link>https://joren.blog/categories/offensive/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/offensive/</guid>
<description></description>
</item>
<item>
<title>Reverse Engineering</title>
<link>https://joren.blog/categories/reverse-engineering/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/reverse-engineering/</guid>
<description></description>
</item>
<item>
<title>Seiko</title>
<link>https://joren.blog/categories/seiko/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/seiko/</guid>
<description></description>
</item>
<item>
<title>Self-Hosting</title>
<link>https://joren.blog/categories/self-hosting/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/self-hosting/</guid>
<description></description>
</item>
<item>
<title>Vpn</title>
<link>https://joren.blog/categories/vpn/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/vpn/</guid>
<description></description>
</item>
<item>
<title>Watches</title>
<link>https://joren.blog/categories/watches/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/watches/</guid>
<description></description>
</item>
<item>
<title>Windows</title>
<link>https://joren.blog/categories/windows/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/windows/</guid>
<description></description>
</item>
<item>
<title>Interview</title>
<link>https://joren.blog/categories/interview/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/interview/</guid>
<description></description>
</item>
<item>
<title>Podcast</title>
<link>https://joren.blog/categories/podcast/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/podcast/</guid>
<description></description>
</item>
<item>
<title>Event</title>
<link>https://joren.blog/categories/event/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/event/</guid>
<description></description>
</item>
<item>
<title>CTF</title>
<link>https://joren.blog/categories/ctf/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/ctf/</guid>
<description></description>
</item>
<item>
<title>Education</title>
<link>https://joren.blog/categories/education/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/education/</guid>
<description></description>
</item>
<item>
<title>Defense</title>
<link>https://joren.blog/categories/defense/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/defense/</guid>
<description></description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Interview on Joren&#39;s Site</title>
<link>https://joren.blog/categories/interview/</link>
<description>Recent content in Interview on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/interview/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Iot on Joren&#39;s Site</title>
<link>https://joren.blog/categories/iot/</link>
<description>Recent content in Iot on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/iot/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;h1 id=&#34;the-smart-home-trap-isolate-or-be-owned&#34;&gt;The Smart Home Trap: Isolate or Be Owned&lt;/h1&gt;&#xA;&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Jdm on Joren&#39;s Site</title>
<link>https://joren.blog/categories/jdm/</link>
<description>Recent content in Jdm on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/jdm/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Network on Joren&#39;s Site</title>
<link>https://joren.blog/categories/network/</link>
<description>Recent content in Network on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/network/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Networking on Joren&#39;s Site</title>
<link>https://joren.blog/categories/networking/</link>
<description>Recent content in Networking on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/networking/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;h1 id=&#34;the-smart-home-trap-isolate-or-be-owned&#34;&gt;The Smart Home Trap: Isolate or Be Owned&lt;/h1&gt;&#xA;&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Offensive on Joren&#39;s Site</title>
<link>https://joren.blog/categories/offensive/</link>
<description>Recent content in Offensive on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/offensive/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Podcast on Joren&#39;s Site</title>
<link>https://joren.blog/categories/podcast/</link>
<description>Recent content in Podcast on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Reverse Engineering on Joren&#39;s Site</title>
<link>https://joren.blog/categories/reverse-engineering/</link>
<description>Recent content in Reverse Engineering on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Seiko on Joren&#39;s Site</title>
<link>https://joren.blog/categories/seiko/</link>
<description>Recent content in Seiko on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/seiko/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Self-Hosting on Joren&#39;s Site</title>
<link>https://joren.blog/categories/self-hosting/</link>
<description>Recent content in Self-Hosting on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/self-hosting/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Vpn on Joren&#39;s Site</title>
<link>https://joren.blog/categories/vpn/</link>
<description>Recent content in Vpn on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/vpn/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Watches on Joren&#39;s Site</title>
<link>https://joren.blog/categories/watches/</link>
<description>Recent content in Watches on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/watches/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Windows on Joren&#39;s Site</title>
<link>https://joren.blog/categories/windows/</link>
<description>Recent content in Windows on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/windows/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because it is too large Load Diff

Binary file not shown.

Before

Width:  |  Height:  |  Size: 57 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 143 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 60 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 54 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 36 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 97 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 133 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 42 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 95 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 56 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 43 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 84 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 89 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 50 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 39 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 19 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 70 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 33 KiB

Some files were not shown because too many files have changed in this diff Show More