h
Before Width: | Height: | Size: 331 KiB After Width: | Height: | Size: 34 KiB |
BIN
assets/images/hero-image.png_old
Normal file
After Width: | Height: | Size: 331 KiB |
@ -19,6 +19,8 @@ banner:
|
|||||||
content: "21 years"
|
content: "21 years"
|
||||||
- title: "Languages"
|
- title: "Languages"
|
||||||
content: "Dutch, English, French"
|
content: "Dutch, English, French"
|
||||||
|
- title: "Phone"
|
||||||
|
content: "+32 456 06 92 55"
|
||||||
- title: "Location"
|
- title: "Location"
|
||||||
content: "Mechelen"
|
content: "Mechelen"
|
||||||
|
|
||||||
@ -136,6 +138,10 @@ contact:
|
|||||||
icon: "fa-solid fa-envelope"
|
icon: "fa-solid fa-envelope"
|
||||||
content: "[jorensc@riseup.net](mailto:jorensc@riseup.net)"
|
content: "[jorensc@riseup.net](mailto:jorensc@riseup.net)"
|
||||||
|
|
||||||
|
- name: "Phone"
|
||||||
|
icon: "fa-solid fa-phone"
|
||||||
|
content: "[+32 456 06 92 55](tel:+32456069255)"
|
||||||
|
|
||||||
- name: "Location"
|
- name: "Location"
|
||||||
icon: "fa-solid fa-location-dot"
|
icon: "fa-solid fa-location-dot"
|
||||||
content: "Mechelen"
|
content: "Mechelen"
|
||||||
|
@ -127,6 +127,7 @@
|
|||||||
"fa-network-wired",
|
"fa-network-wired",
|
||||||
"fa-paper-plane",
|
"fa-paper-plane",
|
||||||
"fa-person-chalkboard",
|
"fa-person-chalkboard",
|
||||||
|
"fa-phone",
|
||||||
"fa-screwdriver-wrench",
|
"fa-screwdriver-wrench",
|
||||||
"fa-shield-halved",
|
"fa-shield-halved",
|
||||||
"fa-solid",
|
"fa-solid",
|
||||||
|
88
public/.htaccess
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
##### Optimize default expiration time - BEGIN
|
||||||
|
<IfModule mod_expires.c>
|
||||||
|
|
||||||
|
## Enable expiration control
|
||||||
|
ExpiresActive On
|
||||||
|
|
||||||
|
## CSS and JS expiration: 1 week after request
|
||||||
|
ExpiresByType text/css "now plus 1 week"
|
||||||
|
ExpiresByType application/javascript "now plus 1 week"
|
||||||
|
ExpiresByType application/x-javascript "now plus 1 week"
|
||||||
|
|
||||||
|
## Image files expiration: 1 month after request
|
||||||
|
ExpiresByType image/bmp "now plus 1 month"
|
||||||
|
ExpiresByType image/gif "now plus 1 month"
|
||||||
|
ExpiresByType image/jpeg "now plus 1 month"
|
||||||
|
ExpiresByType image/webp "now plus 1 month"
|
||||||
|
ExpiresByType image/jp2 "now plus 1 month"
|
||||||
|
ExpiresByType image/pipeg "now plus 1 month"
|
||||||
|
ExpiresByType image/png "now plus 1 month"
|
||||||
|
ExpiresByType image/svg+xml "now plus 1 month"
|
||||||
|
ExpiresByType image/tiff "now plus 1 month"
|
||||||
|
ExpiresByType image/x-icon "now plus 1 month"
|
||||||
|
ExpiresByType image/ico "now plus 1 month"
|
||||||
|
ExpiresByType image/icon "now plus 1 month"
|
||||||
|
ExpiresByType text/ico "now plus 1 month"
|
||||||
|
ExpiresByType application/ico "now plus 1 month"
|
||||||
|
ExpiresByType image/vnd.wap.wbmp "now plus 1 month"
|
||||||
|
|
||||||
|
## Font files expiration: 1 month after request
|
||||||
|
ExpiresByType application/x-font-ttf "now plus 1 month"
|
||||||
|
ExpiresByType application/x-font-opentype "now plus 1 month"
|
||||||
|
ExpiresByType application/x-font-woff "now plus 1 month"
|
||||||
|
ExpiresByType font/woff2 "now plus 1 month"
|
||||||
|
ExpiresByType image/svg+xml "now plus 1 month"
|
||||||
|
|
||||||
|
## Audio files expiration: 1 month after request
|
||||||
|
ExpiresByType audio/ogg "now plus 1 month"
|
||||||
|
ExpiresByType application/ogg "now plus 1 month"
|
||||||
|
ExpiresByType audio/basic "now plus 1 month"
|
||||||
|
ExpiresByType audio/mid "now plus 1 month"
|
||||||
|
ExpiresByType audio/midi "now plus 1 month"
|
||||||
|
ExpiresByType audio/mpeg "now plus 1 month"
|
||||||
|
ExpiresByType audio/mp3 "now plus 1 month"
|
||||||
|
ExpiresByType audio/x-aiff "now plus 1 month"
|
||||||
|
ExpiresByType audio/x-mpegurl "now plus 1 month"
|
||||||
|
ExpiresByType audio/x-pn-realaudio "now plus 1 month"
|
||||||
|
ExpiresByType audio/x-wav "now plus 1 month"
|
||||||
|
|
||||||
|
## Movie files expiration: 1 month after request
|
||||||
|
ExpiresByType application/x-shockwave-flash "now plus 1 month"
|
||||||
|
ExpiresByType x-world/x-vrml "now plus 1 month"
|
||||||
|
ExpiresByType video/x-msvideo "now plus 1 month"
|
||||||
|
ExpiresByType video/mpeg "now plus 1 month"
|
||||||
|
ExpiresByType video/mp4 "now plus 1 month"
|
||||||
|
ExpiresByType video/quicktime "now plus 1 month"
|
||||||
|
ExpiresByType video/x-la-asf "now plus 1 month"
|
||||||
|
ExpiresByType video/x-ms-asf "now plus 1 month"
|
||||||
|
</IfModule>
|
||||||
|
##### Optimize default expiration time - END
|
||||||
|
|
||||||
|
##### 1 Month for most static resources
|
||||||
|
<filesMatch ".(css|jpg|jpeg|png|webp|gif|js|ico|woff|woff2|eot|ttf)$">
|
||||||
|
Header set Cache-Control "public, max-age=31536000, immutable"
|
||||||
|
</filesMatch>
|
||||||
|
|
||||||
|
##### Enable gzip compression for resources
|
||||||
|
<ifModule mod_gzip.c>
|
||||||
|
mod_gzip_on Yes
|
||||||
|
mod_gzip_dechunk Yes
|
||||||
|
mod_gzip_item_include file .(html?|txt|css|js|php)$
|
||||||
|
mod_gzip_item_include handler ^cgi-script$
|
||||||
|
mod_gzip_item_include mime ^text/.*
|
||||||
|
mod_gzip_item_include mime ^application/x-javascript.*
|
||||||
|
mod_gzip_item_exclude mime ^image/.*
|
||||||
|
mod_gzip_item_exclude rspheader ^Content-Encoding:.*gzip.*
|
||||||
|
</ifModule>
|
||||||
|
|
||||||
|
##### Or, compress certain file types by extension:
|
||||||
|
<FilesMatch ".(html|css|jpg|jpeg|webp|png|gif|js|ico)">
|
||||||
|
SetOutputFilter DEFLATE
|
||||||
|
</FilesMatch>
|
||||||
|
|
||||||
|
##### Set Header Vary: Accept-Encoding
|
||||||
|
<IfModule mod_headers.c>
|
||||||
|
<FilesMatch ".(js|css|xml|gz|html)$">
|
||||||
|
Header append Vary: Accept-Encoding
|
||||||
|
</FilesMatch>
|
||||||
|
</IfModule>
|
9191
public/404.html
Normal file
153
public/_index.md_backup
Normal file
@ -0,0 +1,153 @@
|
|||||||
|
---
|
||||||
|
title: Home | Joren
|
||||||
|
description: ''
|
||||||
|
|
||||||
|
# banner
|
||||||
|
banner:
|
||||||
|
greeting: "Hi there!"
|
||||||
|
title: "I'm **Joren Schipman**"
|
||||||
|
image: "images/hero-image.png"
|
||||||
|
designation: "Student Applied Computer Science"
|
||||||
|
institution: "Howest University of Applied Sciences"
|
||||||
|
description: "A professor of artificial intelligence at the Stanford AI Lab. I research interests include distributed robotics, mobile computing and programmable matter."
|
||||||
|
|
||||||
|
additional_info:
|
||||||
|
- title: "Email"
|
||||||
|
content: "jorenschipman@gmail.com"
|
||||||
|
- title: "Phone"
|
||||||
|
content: "+32456069255"
|
||||||
|
- title: "Age"
|
||||||
|
content: "21 years"
|
||||||
|
- title: "Languages"
|
||||||
|
content: "Dutch, English"
|
||||||
|
- title: "Address"
|
||||||
|
content: "Kapelseweg 58a, 2811 Mechelen"
|
||||||
|
|
||||||
|
button:
|
||||||
|
enable: true
|
||||||
|
label: "Download Resume"
|
||||||
|
isDownloadable: true
|
||||||
|
link: "#?"
|
||||||
|
|
||||||
|
|
||||||
|
# skill
|
||||||
|
skill:
|
||||||
|
enable: true
|
||||||
|
title: "My **Skills**"
|
||||||
|
skills:
|
||||||
|
- title: "Playing Science"
|
||||||
|
percentage: "95"
|
||||||
|
- title: "Arts And Craft"
|
||||||
|
percentage: "90"
|
||||||
|
- title: "Creative Writing"
|
||||||
|
percentage: "55"
|
||||||
|
- title: "English Lessons"
|
||||||
|
percentage: "95"
|
||||||
|
- title: "SQL"
|
||||||
|
percentage: "80"
|
||||||
|
- title: "Mongodb"
|
||||||
|
percentage: "95"
|
||||||
|
- title: "Tableau"
|
||||||
|
percentage: "75"
|
||||||
|
- title: "Stella Architect"
|
||||||
|
percentage: "90"
|
||||||
|
|
||||||
|
|
||||||
|
# experience
|
||||||
|
experience:
|
||||||
|
enable: true
|
||||||
|
title: "Experiences"
|
||||||
|
experience_list:
|
||||||
|
- title: "University of Eastern Finland"
|
||||||
|
duration: "Jan 2022 – Present"
|
||||||
|
company: "Rolling Thunder"
|
||||||
|
icon: "fa-solid fa-pen-ruler"
|
||||||
|
description: |
|
||||||
|
Maecenas tempus faucibus rutrum. Duis eu aliquam urna. Proin vitae nulla tristique, ornare felis id congue libero.
|
||||||
|
|
||||||
|
- title: "University of Jyväskylä"
|
||||||
|
duration: "Jan 2020 – Dec 2021"
|
||||||
|
company: "Apple Inc."
|
||||||
|
icon: "fa-solid fa-palette"
|
||||||
|
description: |
|
||||||
|
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
|
||||||
|
|
||||||
|
- title: "University of Eastern Finland"
|
||||||
|
duration: "Jan 2016 – Dec 2019"
|
||||||
|
company: "Google Inc."
|
||||||
|
icon: "fa-solid fa-laptop-code"
|
||||||
|
description: |
|
||||||
|
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# education
|
||||||
|
education:
|
||||||
|
enable: true
|
||||||
|
title: "Education"
|
||||||
|
education_list:
|
||||||
|
- title: "PhD in Statistics"
|
||||||
|
duration: "Jan 2021 to Dec 2022"
|
||||||
|
icon: "fa-solid fa-building-columns"
|
||||||
|
description: |
|
||||||
|
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
|
||||||
|
|
||||||
|
- title: "MSc in Statistics"
|
||||||
|
description: ""
|
||||||
|
institution: ""
|
||||||
|
duration: "Jan 2019 - Dec 2020"
|
||||||
|
icon: "fa-solid fa-person-chalkboard"
|
||||||
|
description: |
|
||||||
|
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
|
||||||
|
|
||||||
|
- title: "BSc in Statistics"
|
||||||
|
description: ""
|
||||||
|
institution: ""
|
||||||
|
duration: "Jan 2019 - Dec 2020"
|
||||||
|
icon: "fa-solid fa-graduation-cap"
|
||||||
|
description: |
|
||||||
|
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
|
||||||
|
|
||||||
|
|
||||||
|
# projects
|
||||||
|
projects:
|
||||||
|
enable: true
|
||||||
|
button:
|
||||||
|
link: "projects/"
|
||||||
|
label: "All Projects"
|
||||||
|
|
||||||
|
|
||||||
|
# blogs
|
||||||
|
blogs:
|
||||||
|
enable: true
|
||||||
|
button:
|
||||||
|
link: "blog/"
|
||||||
|
label: "All Blogs"
|
||||||
|
|
||||||
|
|
||||||
|
# contact
|
||||||
|
contact:
|
||||||
|
enable: true
|
||||||
|
title: "Get in Touch"
|
||||||
|
|
||||||
|
contact_info:
|
||||||
|
title: "Contact"
|
||||||
|
subtitle: "Fill up the form and our Team will get back to you within 24 hours."
|
||||||
|
|
||||||
|
contact_details:
|
||||||
|
- name: "Call"
|
||||||
|
icon: "fa-solid fa-phone-volume"
|
||||||
|
content: "[310-437-2766](tel:310-437-2766)"
|
||||||
|
|
||||||
|
- name: "Mail"
|
||||||
|
icon: "fa-solid fa-envelope"
|
||||||
|
content: "[williamson@gmail.com](mailto:williamson@gmail.com)"
|
||||||
|
|
||||||
|
- name: "Address"
|
||||||
|
icon: "fa-solid fa-location-dot"
|
||||||
|
content: "1901 Thornridge Cir. Shiloh, Hawaii"
|
||||||
|
|
||||||
|
- name: "Fax"
|
||||||
|
icon: "fa-solid fa-phone-volume"
|
||||||
|
content: "[555-123-4567](tel:555-123-4567)"
|
||||||
|
---
|
10750
public/blog/index.html
Normal file
82
public/blog/index.xml
Normal file
@ -0,0 +1,82 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Recent Posts on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/blog/</link>
|
||||||
|
<description>Recent content in Recent Posts on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/blog/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9365
public/blog/post-1/index.html
Normal file
9480
public/blog/post-10/index.html
Normal file
9825
public/blog/post-2/index.html
Normal file
9397
public/blog/post-3/index.html
Normal file
9375
public/blog/post-4/index.html
Normal file
9386
public/blog/post-5/index.html
Normal file
9511
public/blog/post-6/index.html
Normal file
9384
public/blog/post-7/index.html
Normal file
9389
public/blog/post-8/index.html
Normal file
9587
public/blog/post-9/index.html
Normal file
9364
public/categories/alpine-linux/index.html
Normal file
19
public/categories/alpine-linux/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Alpine-Linux on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/alpine-linux/</link>
|
||||||
|
<description>Recent content in Alpine-Linux on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/alpine-linux/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/communication/index.html
Normal file
19
public/categories/communication/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Communication on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/communication/</link>
|
||||||
|
<description>Recent content in Communication on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/communication/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/ctf/index.html
Normal file
19
public/categories/ctf/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>CTF on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/ctf/</link>
|
||||||
|
<description>Recent content in CTF on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
10440
public/categories/cybersecurity/index.html
Normal file
68
public/categories/cybersecurity/index.xml
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Cybersecurity on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/cybersecurity/</link>
|
||||||
|
<description>Recent content in Cybersecurity on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/decentralization/index.html
Normal file
19
public/categories/decentralization/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Decentralization on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/decentralization/</link>
|
||||||
|
<description>Recent content in Decentralization on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/decentralization/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/defense/index.html
Normal file
19
public/categories/defense/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Defense on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/defense/</link>
|
||||||
|
<description>Recent content in Defense on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/defense/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9364
public/categories/dns/index.html
Normal file
19
public/categories/dns/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Dns on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/dns/</link>
|
||||||
|
<description>Recent content in Dns on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/dns/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/education/index.html
Normal file
19
public/categories/education/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Education on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/education/</link>
|
||||||
|
<description>Recent content in Education on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/education/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9510
public/categories/event/index.html
Normal file
26
public/categories/event/index.xml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Event on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/event/</link>
|
||||||
|
<description>Recent content in Event on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/event/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/hardware/index.html
Normal file
19
public/categories/hardware/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Hardware on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/hardware/</link>
|
||||||
|
<description>Recent content in Hardware on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/hardware/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
2
public/categories/index.html
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
|
||||||
|
<script src="/livereload.js?mindelay=10&v=2&port=1313&path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>
|
173
public/categories/index.xml
Normal file
@ -0,0 +1,173 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Categories on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/</link>
|
||||||
|
<description>Recent content in Categories on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Alpine-Linux</title>
|
||||||
|
<link>http://localhost:1313/categories/alpine-linux/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/alpine-linux/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Communication</title>
|
||||||
|
<link>http://localhost:1313/categories/communication/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/communication/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Cybersecurity</title>
|
||||||
|
<link>http://localhost:1313/categories/cybersecurity/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/cybersecurity/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Decentralization</title>
|
||||||
|
<link>http://localhost:1313/categories/decentralization/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/decentralization/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Dns</title>
|
||||||
|
<link>http://localhost:1313/categories/dns/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/dns/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Hardware</title>
|
||||||
|
<link>http://localhost:1313/categories/hardware/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/hardware/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Iot</title>
|
||||||
|
<link>http://localhost:1313/categories/iot/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/iot/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Jdm</title>
|
||||||
|
<link>http://localhost:1313/categories/jdm/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/jdm/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Network</title>
|
||||||
|
<link>http://localhost:1313/categories/network/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/network/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Networking</title>
|
||||||
|
<link>http://localhost:1313/categories/networking/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/networking/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Offensive</title>
|
||||||
|
<link>http://localhost:1313/categories/offensive/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/offensive/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Reverse Engineering</title>
|
||||||
|
<link>http://localhost:1313/categories/reverse-engineering/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/reverse-engineering/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Seiko</title>
|
||||||
|
<link>http://localhost:1313/categories/seiko/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/seiko/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Self-Hosting</title>
|
||||||
|
<link>http://localhost:1313/categories/self-hosting/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/self-hosting/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Vpn</title>
|
||||||
|
<link>http://localhost:1313/categories/vpn/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/vpn/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Watches</title>
|
||||||
|
<link>http://localhost:1313/categories/watches/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/watches/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Windows</title>
|
||||||
|
<link>http://localhost:1313/categories/windows/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/windows/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Interview</title>
|
||||||
|
<link>http://localhost:1313/categories/interview/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/interview/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Podcast</title>
|
||||||
|
<link>http://localhost:1313/categories/podcast/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/podcast/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Event</title>
|
||||||
|
<link>http://localhost:1313/categories/event/</link>
|
||||||
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/event/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>CTF</title>
|
||||||
|
<link>http://localhost:1313/categories/ctf/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/ctf/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Education</title>
|
||||||
|
<link>http://localhost:1313/categories/education/</link>
|
||||||
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/education/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Defense</title>
|
||||||
|
<link>http://localhost:1313/categories/defense/</link>
|
||||||
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/defense/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/interview/index.html
Normal file
19
public/categories/interview/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Interview on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/interview/</link>
|
||||||
|
<description>Recent content in Interview on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/interview/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9513
public/categories/iot/index.html
Normal file
26
public/categories/iot/index.xml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Iot on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/iot/</link>
|
||||||
|
<description>Recent content in Iot on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/iot/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/jdm/index.html
Normal file
19
public/categories/jdm/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Jdm on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/jdm/</link>
|
||||||
|
<description>Recent content in Jdm on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/jdm/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/network/index.html
Normal file
19
public/categories/network/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Network on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/network/</link>
|
||||||
|
<description>Recent content in Network on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/network/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9519
public/categories/networking/index.html
Normal file
26
public/categories/networking/index.xml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Networking on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/networking/</link>
|
||||||
|
<description>Recent content in Networking on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/networking/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9513
public/categories/offensive/index.html
Normal file
26
public/categories/offensive/index.xml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Offensive on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/offensive/</link>
|
||||||
|
<description>Recent content in Offensive on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/offensive/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/podcast/index.html
Normal file
19
public/categories/podcast/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Podcast on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/podcast/</link>
|
||||||
|
<description>Recent content in Podcast on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/reverse-engineering/index.html
Normal file
19
public/categories/reverse-engineering/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Reverse Engineering on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/reverse-engineering/</link>
|
||||||
|
<description>Recent content in Reverse Engineering on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/seiko/index.html
Normal file
19
public/categories/seiko/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Seiko on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/seiko/</link>
|
||||||
|
<description>Recent content in Seiko on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/seiko/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9364
public/categories/self-hosting/index.html
Normal file
19
public/categories/self-hosting/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Self-Hosting on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/self-hosting/</link>
|
||||||
|
<description>Recent content in Self-Hosting on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/self-hosting/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9364
public/categories/vpn/index.html
Normal file
19
public/categories/vpn/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Vpn on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/vpn/</link>
|
||||||
|
<description>Recent content in Vpn on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/vpn/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/watches/index.html
Normal file
19
public/categories/watches/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Watches on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/watches/</link>
|
||||||
|
<description>Recent content in Watches on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/watches/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
9358
public/categories/windows/index.html
Normal file
19
public/categories/windows/index.xml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
||||||
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
|
<channel>
|
||||||
|
<title>Windows on Joren's Site</title>
|
||||||
|
<link>http://localhost:1313/categories/windows/</link>
|
||||||
|
<description>Recent content in Windows on Joren's Site</description>
|
||||||
|
<generator>Hugo</generator>
|
||||||
|
<language>en</language>
|
||||||
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
|
<atom:link href="http://localhost:1313/categories/windows/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
</channel>
|
||||||
|
</rss>
|
18800
public/css/style.css
Normal file
BIN
public/images/blog/blog-1.jpg
Normal file
After Width: | Height: | Size: 57 KiB |
BIN
public/images/blog/blog-10.jpg
Normal file
After Width: | Height: | Size: 143 KiB |
BIN
public/images/blog/blog-10_hu_35c38cc09be1cad4.jpg
Normal file
After Width: | Height: | Size: 60 KiB |
BIN
public/images/blog/blog-10_hu_4379874c5f05b59f.webp
Normal file
After Width: | Height: | Size: 54 KiB |
BIN
public/images/blog/blog-10_hu_7491d1d603de5dcf.webp
Normal file
After Width: | Height: | Size: 36 KiB |
BIN
public/images/blog/blog-10_hu_a3b0ec28e3d5779b.webp
Normal file
After Width: | Height: | Size: 97 KiB |
BIN
public/images/blog/blog-10_hu_bb979f59174514ec.jpg
Normal file
After Width: | Height: | Size: 133 KiB |
BIN
public/images/blog/blog-10_hu_d525f0cd93d6fcb1.webp
Normal file
After Width: | Height: | Size: 42 KiB |
BIN
public/images/blog/blog-10_hu_e27e2f85e226178c.webp
Normal file
After Width: | Height: | Size: 48 KiB |
BIN
public/images/blog/blog-1_hu_4b1782fd1a15e83b.webp
Normal file
After Width: | Height: | Size: 32 KiB |
BIN
public/images/blog/blog-1_hu_8dd81870b6dccbe7.jpg
Normal file
After Width: | Height: | Size: 95 KiB |
BIN
public/images/blog/blog-1_hu_8def6289c64a2dc8.webp
Normal file
After Width: | Height: | Size: 30 KiB |
BIN
public/images/blog/blog-1_hu_c69497547b6be0b8.webp
Normal file
After Width: | Height: | Size: 56 KiB |
BIN
public/images/blog/blog-1_hu_d77be45b273e444.jpg
Normal file
After Width: | Height: | Size: 43 KiB |
BIN
public/images/blog/blog-1_hu_dcdbc2fa445f98d0.webp
Normal file
After Width: | Height: | Size: 24 KiB |
BIN
public/images/blog/blog-1_hu_f9ab0f5f2b4013b3.webp
Normal file
After Width: | Height: | Size: 26 KiB |
BIN
public/images/blog/blog-3.jpg
Normal file
After Width: | Height: | Size: 84 KiB |
BIN
public/images/blog/blog-3_hu_2ce558f2693339dd.webp
Normal file
After Width: | Height: | Size: 28 KiB |
BIN
public/images/blog/blog-3_hu_3ede4323b8664a75.webp
Normal file
After Width: | Height: | Size: 20 KiB |
BIN
public/images/blog/blog-3_hu_67e89b89a8dc0de1.jpg
Normal file
After Width: | Height: | Size: 89 KiB |
BIN
public/images/blog/blog-3_hu_7893dc97eea078f.webp
Normal file
After Width: | Height: | Size: 50 KiB |
BIN
public/images/blog/blog-3_hu_8d0001f985ca2e5e.webp
Normal file
After Width: | Height: | Size: 23 KiB |
BIN
public/images/blog/blog-3_hu_c932299ff2fa7067.jpg
Normal file
After Width: | Height: | Size: 39 KiB |
BIN
public/images/blog/blog-3_hu_fdd9e13d0370b160.webp
Normal file
After Width: | Height: | Size: 26 KiB |
BIN
public/images/blog/blog-4.jpg
Normal file
After Width: | Height: | Size: 2.2 MiB |
BIN
public/images/blog/blog-4_hu_2f5acf67112899f5.webp
Normal file
After Width: | Height: | Size: 19 KiB |
BIN
public/images/blog/blog-4_hu_8ddea2f052660626.webp
Normal file
After Width: | Height: | Size: 17 KiB |
BIN
public/images/blog/blog-4_hu_91f1b60de32f3a0d.jpg
Normal file
After Width: | Height: | Size: 70 KiB |
BIN
public/images/blog/blog-4_hu_96cadc46e7508592.jpg
Normal file
After Width: | Height: | Size: 32 KiB |
BIN
public/images/blog/blog-4_hu_a14b7dcdb6d8d5d6.webp
Normal file
After Width: | Height: | Size: 14 KiB |
BIN
public/images/blog/blog-4_hu_a611bbe12accd648.webp
Normal file
After Width: | Height: | Size: 33 KiB |