This commit is contained in:
Joren 2025-05-31 16:28:52 +02:00
parent 325013bd2f
commit 70c43984cc
Signed by: Joren
GPG Key ID: 280E33DFBC0F1B55
272 changed files with 288 additions and 420914 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.0 MiB

After

Width:  |  Height:  |  Size: 29 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 202 KiB

View File

@ -11,7 +11,7 @@ mainSections = ["blog"]
# image gallery shortcode # image gallery shortcode
image_gallery = true image_gallery = true
# contact form action # contact form action
contact_form_action = "#" # contact form works with [https://airform.io/] or [https://formspree.io] contact_form_action = "https://airform.io/jorensc@riseup.net" # contact form works with [https://airform.io/] or [https://formspree.io]
# google tag manager, see https://developers.google.com/tag-manager/ # google tag manager, see https://developers.google.com/tag-manager/
google_tag_manager = "" # example: G-XXXXXXXXXX google_tag_manager = "" # example: G-XXXXXXXXXX
google_adsense = "" # example: ca-pub-xxxxxxxxxxxxxxxx google_adsense = "" # example: ca-pub-xxxxxxxxxxxxxxxx

View File

@ -19,8 +19,6 @@ banner:
content: "Dutch, English, French" content: "Dutch, English, French"
- title: "Email" - title: "Email"
content: "jorensc@riseup.net" content: "jorensc@riseup.net"
- title: "Phone"
content: "+32 456 06 92 55"
- title: "Location" - title: "Location"
content: "Mechelen" content: "Mechelen"
@ -124,10 +122,6 @@ contact:
icon: "fa-solid fa-envelope" icon: "fa-solid fa-envelope"
content: "[jorensc@riseup.net](mailto:jorensc@riseup.net)" content: "[jorensc@riseup.net](mailto:jorensc@riseup.net)"
- name: "Phone"
icon: "fa-solid fa-phone"
content: "[+32 456 06 92 55](tel:+32456069255)"
- name: "Location" - name: "Location"
icon: "fa-solid fa-location-dot" icon: "fa-solid fa-location-dot"
content: "Mechelen" content: "Mechelen"

View File

@ -2,7 +2,7 @@
title: "The Smart Home Trap: Isolate or Be Owned" title: "The Smart Home Trap: Isolate or Be Owned"
image: "images/blog/blog-10.jpg" image: "images/blog/blog-10.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-01-30 00:00:00 +0000 UTC"
description: "Your smart lightbulb doesn't need to talk to your NAS. Here's how and why to isolate IoT devices using VLANs, even in a small home network." description: "Your smart lightbulb doesn't need to talk to your NAS. Here's how and why to isolate IoT devices using VLANs, even in a small home network."
categories: ["networking", "iot", "cybersecurity"] categories: ["networking", "iot", "cybersecurity"]
draft: false draft: false

View File

@ -2,7 +2,7 @@
title: "Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks" title: "Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks"
image: "images/blog/blog-5.jpg" image: "images/blog/blog-5.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-04-10 00:00:00 +0000 UTC"
description: "How name resolution protocols and IPv6 misconfigurations enable credential interception and NTLM relay attacks using Responder and mitm6." description: "How name resolution protocols and IPv6 misconfigurations enable credential interception and NTLM relay attacks using Responder and mitm6."
categories: ["cybersecurity", "offensive", "network"] categories: ["cybersecurity", "offensive", "network"]
draft: false draft: false

View File

@ -1,7 +1,7 @@
--- ---
title: "Matrix: Building a Decentralized Communication Future" title: "Matrix: Building a Decentralized Communication Future"
image: "images/blog/blog-6.jpg" image: "images/blog/blog-6.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-03-21 00:00:00 +0000 UTC"
description: "An in-depth exploration of the Matrix protocol, how it decentralizes messaging, enhances privacy, integrates with existing systems, and scales for real-world use." description: "An in-depth exploration of the Matrix protocol, how it decentralizes messaging, enhances privacy, integrates with existing systems, and scales for real-world use."
categories: ["cybersecurity", "communication", "decentralization"] categories: ["cybersecurity", "communication", "decentralization"]
draft: false draft: false

View File

@ -2,7 +2,7 @@
title: "Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains" title: "Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains"
image: "images/blog/blog-7.jpg" image: "images/blog/blog-7.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-05-06 00:00:00 +0000 UTC"
description: "Kerberos is a cornerstone of enterprise authentication in Windows domains. But what happens when attackers turn its trust model against itself?" description: "Kerberos is a cornerstone of enterprise authentication in Windows domains. But what happens when attackers turn its trust model against itself?"
categories: ["cybersecurity", "offensive", "windows"] categories: ["cybersecurity", "offensive", "windows"]
draft: false draft: false

View File

@ -2,7 +2,7 @@
title: "Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera" title: "Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera"
image: "images/blog/blog-8.jpg" image: "images/blog/blog-8.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2024-12-10 00:00:00 +0000 UTC"
description: "What happens when you mix a €22.95 PTZ camera, physical access, and bad defaults? A practical look at hardware abuse in consumer IoT." description: "What happens when you mix a €22.95 PTZ camera, physical access, and bad defaults? A practical look at hardware abuse in consumer IoT."
categories: ["iot", "hardware", "reverse engineering"] categories: ["iot", "hardware", "reverse engineering"]
draft: false draft: false

View File

@ -2,7 +2,7 @@
title: "Seiko SARV001: The JDM Sleeper That Punches Above Its Weight" title: "Seiko SARV001: The JDM Sleeper That Punches Above Its Weight"
image: "images/blog/blog-9.jpg" image: "images/blog/blog-9.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-02-18 00:00:00 +0000 UTC"
description: "A closer look at the Seiko SARV001, a Japanese Domestic Market gem that offers exceptional value and understated elegance." description: "A closer look at the Seiko SARV001, a Japanese Domestic Market gem that offers exceptional value and understated elegance."
categories: ["watches", "jdm", "seiko"] categories: ["watches", "jdm", "seiko"]
draft: false draft: false

View File

@ -1,8 +1,8 @@
--- ---
title: "DRMDTool Project" title: "Automated DRM Media Downloading: Decrypt, Organize, and Monitor"
image: "/images/project/project-1.jpg" image: "/images/project/project-1.jpg"
date: "2025-05-21 00:00:00 +0000 UTC" date: "2024-12-17 00:00:00 +0000 UTC"
description: "DRMDTool is a complete solution for handling `.drmd` files with automated decryption and downloading via N\_m3u8DL-RE, watch folder monitoring, and a rich web UI." description: "DRMDTool is a complete solution for handling `.drmd` files with automated decryption and downloading via N\_m3u8DL-RE, watch folder monitoring, and a rich web UI."
draft: false draft: false
@ -12,19 +12,19 @@ DRMDTool is an automation-centric utility designed to streamline the processing
<br> <br>
### Whats New #### Whats New
DRMDTool has evolved into a comprehensive platform for batch downloading with enhanced support for user interaction and background processing. It features granular job tracking, dynamic download control (pause, resume, abort), and a refined WebSocket-based console for real-time command output. Subtitle handling now includes automatic downloading and conversion from VTT to SRT, and the downloader adapts based on metadata, organizing content into categorized directories. DRMDTool has evolved into a comprehensive platform for batch downloading with enhanced support for user interaction and background processing. It features granular job tracking, dynamic download control (pause, resume, abort), and a refined WebSocket-based console for real-time command output. Subtitle handling now includes automatic downloading and conversion from VTT to SRT, and the downloader adapts based on metadata, organizing content into categorized directories.
<br> <br>
### Goals and Use Case #### Goals and Use Case
The primary aim is to automate `.drmd` file processing with minimal manual input. Users can configure download formats, specify directories, and enable real-time command broadcasting. DRMDTool is suitable for both interactive use through a web UI and headless automation in pipelines, supporting inotify or polling-based folder watching. The primary aim is to automate `.drmd` file processing with minimal manual input. Users can configure download formats, specify directories, and enable real-time command broadcasting. DRMDTool is suitable for both interactive use through a web UI and headless automation in pipelines, supporting inotify or polling-based folder watching.
<br> <br>
### How `.drmd` Files Work #### How `.drmd` Files Work
A `.drmd` file is a structured JSON document that defines one or more encrypted media items to be processed by DRMDTool. It contains an `Items` array, with each item representing a specific media job. DRMDTool parses these entries to generate download commands for N\_m3u8DL-RE. A `.drmd` file is a structured JSON document that defines one or more encrypted media items to be processed by DRMDTool. It contains an `Items` array, with each item representing a specific media job. DRMDTool parses these entries to generate download commands for N\_m3u8DL-RE.
@ -37,7 +37,7 @@ Each item includes:
* **Metadata**: A semicolon-separated string like `Title;Type;Season` (e.g., `Example Show;serie;1`) used to determine directory structure (`Movies/Title` or `Series/Title/Season`). * **Metadata**: A semicolon-separated string like `Title;Type;Season` (e.g., `Example Show;serie;1`) used to determine directory structure (`Movies/Title` or `Series/Title/Season`).
* **Description** and **Poster**: Optional fields used only for display in the web UI. * **Description** and **Poster**: Optional fields used only for display in the web UI.
#### Example `.drmd` Structure ##### Example `.drmd` Structure
```json ```json
{ {
@ -55,7 +55,7 @@ Each item includes:
} }
``` ```
### Processing Steps #### Processing Steps
1. **Detection**: DRMDTool either watches a folder or receives `.drmd` uploads through the web UI. 1. **Detection**: DRMDTool either watches a folder or receives `.drmd` uploads through the web UI.
2. **Validation**: It waits for the file to finish writing (based on file size stability), then parses its contents. 2. **Validation**: It waits for the file to finish writing (based on file size stability), then parses its contents.
@ -67,13 +67,13 @@ These files serve as portable job definitions. When DRMDTool detects or receives
<br> <br>
### Architecture Overview #### Architecture Overview
The configuration is handled via `config.toml`, with environment variable overrides for containerized or dynamic deployments. Once started, the tool can either monitor a specified folder or allow file uploads through the UI. Each `.drmd` file is parsed, grouped by series and season (if applicable), and processed sequentially with support for job pausing and resuming. The configuration is handled via `config.toml`, with environment variable overrides for containerized or dynamic deployments. Once started, the tool can either monitor a specified folder or allow file uploads through the UI. Each `.drmd` file is parsed, grouped by series and season (if applicable), and processed sequentially with support for job pausing and resuming.
<br> <br>
### Web UI & CLI #### Web UI & CLI
To use: To use:
@ -91,13 +91,13 @@ Jobs can be paused, resumed, or aborted through the web interface, which reflect
<br> <br>
### Enhanced Download Logic #### Enhanced Download Logic
DRMDTool dynamically builds download commands using metadata from `.drmd` files and user preferences. It ensures that only the highest quality streams are kept, removing ad periods and duplicate segments from the MPD files. Subtitles are fetched and embedded automatically. Jobs are tracked with robust state management and logs for debugging and visibility. DRMDTool dynamically builds download commands using metadata from `.drmd` files and user preferences. It ensures that only the highest quality streams are kept, removing ad periods and duplicate segments from the MPD files. Subtitles are fetched and embedded automatically. Jobs are tracked with robust state management and logs for debugging and visibility.
<br> <br>
### Repository #### Repository
Code and setup instructions are hosted here: Code and setup instructions are hosted here:
[https://git.directme.in/Joren/DRMDTool](https://git.directme.in/Joren/DRMDTool) [https://git.directme.in/Joren/DRMDTool](https://git.directme.in/Joren/DRMDTool)

View File

@ -1,6 +1,6 @@
--- ---
title: "Building My Hugo Website on a VPS" title: "Self-Hosting My Hugo Blog: Minimal Deployment on a VPS"
image: "/images/project/project-2.jpg" image: "/images/project/project-2.jpg"
date: "2025-05-29 00:00:00 +0000 UTC" date: "2025-05-29 00:00:00 +0000 UTC"
description: "How I built and deployed my personal blog using Hugo and hosted it on a minimal Alpine Linux VPS." description: "How I built and deployed my personal blog using Hugo and hosted it on a minimal Alpine Linux VPS."
@ -12,7 +12,7 @@ I built my personal blog using [Hugo](https://gohugo.io/) and deployed it on a l
<br> <br>
### Creating the Hugo Site #### Creating the Hugo Site
On my development machine, I created a new Hugo site: On my development machine, I created a new Hugo site:
@ -26,7 +26,7 @@ All content lives under `content/`, with separate folders for `blog/` and `proje
<br> <br>
### Customization #### Customization
I edited the `config/_default/hugo.toml` to configure site parameters like the base URL, theme, language, and menus. SCSS and image assets go in `assets/`, and are processed by Hugo's pipeline. Static files like favicons are placed in `static/`. I edited the `config/_default/hugo.toml` to configure site parameters like the base URL, theme, language, and menus. SCSS and image assets go in `assets/`, and are processed by Hugo's pipeline. Static files like favicons are placed in `static/`.
@ -46,7 +46,7 @@ This generates everything in the `public/` folder.
<br> <br>
### VPS Deployment #### VPS Deployment
I rented a minimal Alpine Linux VPS and installed only what I needed. After setting up SSH and a basic nginx web server, I copied the `public/` folder over using `scp`: I rented a minimal Alpine Linux VPS and installed only what I needed. After setting up SSH and a basic nginx web server, I copied the `public/` folder over using `scp`:
@ -71,7 +71,7 @@ Now my Hugo site is live and served directly as static files, no backend, no dat
<br> <br>
### Why Alpine + Hugo? #### Why Alpine + Hugo?
Alpine Linux is minimal and fast, perfect for serving static sites with low resource usage. Combined with Hugos speed and flexibility, I get a complete, performant setup that I fully control. Its secure, lightweight, and easy to update, just rebuild and re-upload the `public/` folder. Alpine Linux is minimal and fast, perfect for serving static sites with low resource usage. Combined with Hugos speed and flexibility, I get a complete, performant setup that I fully control. Its secure, lightweight, and easy to update, just rebuild and re-upload the `public/` folder.

View File

@ -2,7 +2,7 @@
title: "Lean and Local: DNS, VPN, IRC and Ad Blocking" title: "Lean and Local: DNS, VPN, IRC and Ad Blocking"
image: "/images/project/project-3.jpg" image: "/images/project/project-3.jpg"
date: "2025-05-30 00:00:00 +0000 UTC" date: "2025-02-08 00:00:00 +0000 UTC"
description: "A lightweight Alpine Linux system running DNS filtering, WireGuard VPN, and IRC on minimal hardware using a diskless setup." description: "A lightweight Alpine Linux system running DNS filtering, WireGuard VPN, and IRC on minimal hardware using a diskless setup."
categories: ["self-hosting", "networking", "alpine-linux", "vpn", "dns"] categories: ["self-hosting", "networking", "alpine-linux", "vpn", "dns"]
draft: false draft: false

View File

@ -0,0 +1,174 @@
---
title: "Sniffing on a Budget: Malware Detection with Suricata and Alpine Linux"
image: "/images/project/project-4.jpg"
date: "2025-04-15 00:00:00 +0000 UTC"
description: "Setting up Suricata on minimal hardware to passively inspect mirrored traffic for malware and exploits using open threat intelligence rules."
categories: ["networking", "security", "alpine-linux", "ids"]
draft: false
---
Most people think intrusion detection needs powerful servers and commercial software. But Suricata runs fine on low-end x86 boxes, especially if you keep it passive. This project outlines how I used a spare thin client with Alpine Linux to sniff mirrored traffic from my firewall and catch signs of malware using [Emerging Threats](https://rules.emergingthreats.net/open/suricata/emerging-all.rules).
---
#### Hardware & Network Setup
The system is an old fanless mini-PC with 2 Intel NICs and 2 GB RAM. I installed Alpine Linux (persistent disk install), assigned one NIC as a management interface, and the other as a dedicated sniffing interface connected to a **mirror port** (SPAN) on my router.
> The firewall/router mirrors all LAN+WAN traffic to this second NIC, letting Suricata see everything without interfering.
This setup also works in a virtual machine with two NICs, one configured by DHCP, and one left “just up” for passive monitoring or PCAP replays.
---
#### Installing Suricata on Alpine
Suricata is available directly from Alpines community repository:
```sh
apk add suricata suricata-openrc
```
This installs the engine, configuration in `/etc/suricata/`, rule files under `/var/lib/suricata/rules/`, and service support via OpenRC.
---
#### Fetching Rules
Download the Emerging Threats open ruleset without overwriting the defaults:
```sh
curl -o /var/lib/suricata/rules/emerging-all.rules https://rules.emergingthreats.net/open/suricata/emerging-all.rules
```
Then, edit `/etc/suricata/suricata.yaml` and modify the rule list:
```yaml
rule-files:
- suricata.rules
- emerging-all.rules
```
This extends the detection surface with thousands of community-contributed signatures for malware, botnets, suspicious DNS, phishing, and more.
---
#### Configuring Suricata
Make sure the sniffing interface (e.g. `eth1`) is up but not configured:
```sh
ip link set eth1 up
```
In `/etc/suricata/suricata.yaml`, configure af-packet for passive packet capture:
```yaml
af-packet:
- interface: eth1
cluster-id: 99
cluster-type: cluster_flow
defrag: yes
```
Limit Suricatas outputs to what you actually want to inspect:
```yaml
outputs:
- eve-log:
enabled: yes
filetype: regular
filename: /var/log/suricata/eve.json
types:
- alert:
metadata: yes
- http
- fast:
enabled: yes
filename: /var/log/suricata/fast.log
```
---
#### Starting the Service
Enable and start Suricata:
```sh
rc-update add suricata
rc-service suricata start
```
If everything is set correctly, it will begin passively processing traffic on `eth1`.
---
#### Testing Alerting (SID 2100498)
A quick way to confirm that Suricata is working is to trigger rule SID `2100498` from the Emerging Threats ruleset. It alerts on any response containing `uid=0(root)`.
Start watching the alerts:
```sh
tail -f /var/log/suricata/fast.log
```
Then, from any browser or terminal on your LAN:
```sh
curl http://testmynids.org/uid/index.html
```
You should see output like:
```
[1:2100498:7] GPL ATTACK_RESPONSE id check returned root [**] [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 18.245.175.66:80 -> 192.168.x.x:54918
```
Or the JSON form in `/var/log/suricata/eve.json`:
```json
"signature": "GPL ATTACK_RESPONSE id check returned root",
"category": "Potentially Bad Traffic",
"severity": 2
```
{{< image src="images/project/project-4/flag.png" caption="Suricata flagging the test traffic" alt="alter-text" height="425" width="860" position="center" command="fit" option="q100" class="img-fluid" title="Suricata flagging the test traffic" >}}
This confirms Suricata is capturing mirrored traffic and detecting threats using the provided rule set.
---
#### Monitoring Real Traffic
Once deployed, Suricata writes alerts to `/var/log/suricata/eve.json` and `/var/log/suricata/fast.log`. To inspect live alerts:
```sh
tail -f /var/log/suricata/eve.json | jq 'select(.event_type == "alert")'
```
Youll see entries like:
* `ET MALWARE`
* `ET CNC`
* `ET POLICY`
* `ET TROJAN`
These cover known exploit kits, malware callbacks, tunneling, DNS abuse, and other threats.
---
#### Final Thoughts
Suricata turns a cheap Alpine box into a passive intrusion detection system thats dead silent and effective. Combined with a mirror port and strong ruleset, it gives you visibility into your network without needing to be inline or disruptive.
In my case, this setup flagged:
* An IoT camera connecting to random IPs in foreign ASNs
* A Windows PC hitting typo-squatted domains
* Misconfigured smart devices leaking traffic over HTTP
{{< notice tip >}}Want to deploy this yourself? Check your router or switch config for SPAN/mirror port support. Many consumer devices (OpenWRT, MikroTik, EdgeOS) support traffic mirroring to a secondary NIC.{{< /notice >}}

View File

@ -4,6 +4,8 @@
"a", "a",
"article", "article",
"aside", "aside",
"base",
"blockquote",
"body", "body",
"br", "br",
"button", "button",
@ -18,6 +20,7 @@
"h2", "h2",
"h3", "h3",
"h4", "h4",
"h5",
"head", "head",
"hr", "hr",
"html", "html",
@ -75,6 +78,7 @@
"caption-Picture-of-the-solution", "caption-Picture-of-the-solution",
"caption-SARV001-Kanji", "caption-SARV001-Kanji",
"caption-SARV001-Lume", "caption-SARV001-Lume",
"caption-Suricata-flagging-the-test-traffic",
"card", "card",
"card-body", "card-body",
"card-btn", "card-btn",
@ -120,15 +124,12 @@
"fa-envelope", "fa-envelope",
"fa-folder-open", "fa-folder-open",
"fa-github", "fa-github",
"fa-graduation-cap",
"fa-linkedin", "fa-linkedin",
"fa-list-check", "fa-list-check",
"fa-location-dot", "fa-location-dot",
"fa-network-wired", "fa-network-wired",
"fa-paper-plane", "fa-paper-plane",
"fa-person-chalkboard", "fa-person-chalkboard",
"fa-phone",
"fa-screwdriver-wrench",
"fa-shield-halved", "fa-shield-halved",
"fa-solid", "fa-solid",
"fa-user", "fa-user",
@ -274,8 +275,10 @@
"caption-Picture of the solution", "caption-Picture of the solution",
"caption-SARV001 Kanji", "caption-SARV001 Kanji",
"caption-SARV001 Lume", "caption-SARV001 Lume",
"caption-Suricata flagging the test traffic",
"capturing-vs-relaying", "capturing-vs-relaying",
"caveats--limitations", "caveats--limitations",
"configuring-suricata",
"contact", "contact",
"creating-the-hugo-site", "creating-the-hugo-site",
"customization", "customization",
@ -289,16 +292,19 @@
"enhanced-download-logic", "enhanced-download-logic",
"example-drmd-structure", "example-drmd-structure",
"federation-and-interoperability", "federation-and-interoperability",
"fetching-rules",
"final-thoughts", "final-thoughts",
"firstName", "firstName",
"from-the-battlefield-to-the-classroom", "from-the-battlefield-to-the-classroom",
"goals-and-use-case", "goals-and-use-case",
"hardware--network-setup",
"high-stakes-real-lessons", "high-stakes-real-lessons",
"highlights-and-blooper-reel", "highlights-and-blooper-reel",
"how-drmd-files-work", "how-drmd-files-work",
"how-kerberos-actually-works", "how-kerberos-actually-works",
"human-factors-and-growth", "human-factors-and-growth",
"infinite-luck-one-in-a-million", "infinite-luck-one-in-a-million",
"installing-suricata-on-alpine",
"ipv6-enabled-by-default-forgotten-by-admins", "ipv6-enabled-by-default-forgotten-by-admins",
"irc-ngircd", "irc-ngircd",
"kerberoasting-plaintext-passwords-in-disguise", "kerberoasting-plaintext-passwords-in-disguise",
@ -310,6 +316,7 @@
"matrix-in-cybersecurity-contexts", "matrix-in-cybersecurity-contexts",
"message", "message",
"mitigation", "mitigation",
"monitoring-real-traffic",
"movement--performance", "movement--performance",
"name-resolution-chaos", "name-resolution-chaos",
"navbar", "navbar",
@ -330,6 +337,8 @@
"security-end-to-end-encryption-by-default", "security-end-to-end-encryption-by-default",
"sidebarContent", "sidebarContent",
"skill", "skill",
"starting-the-service",
"testing-alerting-sid-2100498",
"the-black-team-rapid-response-in-action", "the-black-team-rapid-response-in-action",
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex", "the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
"the-exercise-locked-shields", "the-exercise-locked-shields",

View File

@ -1,88 +0,0 @@
##### Optimize default expiration time - BEGIN
<IfModule mod_expires.c>
## Enable expiration control
ExpiresActive On
## CSS and JS expiration: 1 week after request
ExpiresByType text/css "now plus 1 week"
ExpiresByType application/javascript "now plus 1 week"
ExpiresByType application/x-javascript "now plus 1 week"
## Image files expiration: 1 month after request
ExpiresByType image/bmp "now plus 1 month"
ExpiresByType image/gif "now plus 1 month"
ExpiresByType image/jpeg "now plus 1 month"
ExpiresByType image/webp "now plus 1 month"
ExpiresByType image/jp2 "now plus 1 month"
ExpiresByType image/pipeg "now plus 1 month"
ExpiresByType image/png "now plus 1 month"
ExpiresByType image/svg+xml "now plus 1 month"
ExpiresByType image/tiff "now plus 1 month"
ExpiresByType image/x-icon "now plus 1 month"
ExpiresByType image/ico "now plus 1 month"
ExpiresByType image/icon "now plus 1 month"
ExpiresByType text/ico "now plus 1 month"
ExpiresByType application/ico "now plus 1 month"
ExpiresByType image/vnd.wap.wbmp "now plus 1 month"
## Font files expiration: 1 month after request
ExpiresByType application/x-font-ttf "now plus 1 month"
ExpiresByType application/x-font-opentype "now plus 1 month"
ExpiresByType application/x-font-woff "now plus 1 month"
ExpiresByType font/woff2 "now plus 1 month"
ExpiresByType image/svg+xml "now plus 1 month"
## Audio files expiration: 1 month after request
ExpiresByType audio/ogg "now plus 1 month"
ExpiresByType application/ogg "now plus 1 month"
ExpiresByType audio/basic "now plus 1 month"
ExpiresByType audio/mid "now plus 1 month"
ExpiresByType audio/midi "now plus 1 month"
ExpiresByType audio/mpeg "now plus 1 month"
ExpiresByType audio/mp3 "now plus 1 month"
ExpiresByType audio/x-aiff "now plus 1 month"
ExpiresByType audio/x-mpegurl "now plus 1 month"
ExpiresByType audio/x-pn-realaudio "now plus 1 month"
ExpiresByType audio/x-wav "now plus 1 month"
## Movie files expiration: 1 month after request
ExpiresByType application/x-shockwave-flash "now plus 1 month"
ExpiresByType x-world/x-vrml "now plus 1 month"
ExpiresByType video/x-msvideo "now plus 1 month"
ExpiresByType video/mpeg "now plus 1 month"
ExpiresByType video/mp4 "now plus 1 month"
ExpiresByType video/quicktime "now plus 1 month"
ExpiresByType video/x-la-asf "now plus 1 month"
ExpiresByType video/x-ms-asf "now plus 1 month"
</IfModule>
##### Optimize default expiration time - END
##### 1 Month for most static resources
<filesMatch ".(css|jpg|jpeg|png|webp|gif|js|ico|woff|woff2|eot|ttf)$">
Header set Cache-Control "public, max-age=31536000, immutable"
</filesMatch>
##### Enable gzip compression for resources
<ifModule mod_gzip.c>
mod_gzip_on Yes
mod_gzip_dechunk Yes
mod_gzip_item_include file .(html?|txt|css|js|php)$
mod_gzip_item_include handler ^cgi-script$
mod_gzip_item_include mime ^text/.*
mod_gzip_item_include mime ^application/x-javascript.*
mod_gzip_item_exclude mime ^image/.*
mod_gzip_item_exclude rspheader ^Content-Encoding:.*gzip.*
</ifModule>
##### Or, compress certain file types by extension:
<FilesMatch ".(html|css|jpg|jpeg|webp|png|gif|js|ico)">
SetOutputFilter DEFLATE
</FilesMatch>
##### Set Header Vary: Accept-Encoding
<IfModule mod_headers.c>
<FilesMatch ".(js|css|xml|gz|html)$">
Header append Vary: Accept-Encoding
</FilesMatch>
</IfModule>

File diff suppressed because one or more lines are too long

View File

@ -1,153 +0,0 @@
---
title: Home | Joren
description: ''
# banner
banner:
greeting: "Hi there!"
title: "I'm **Joren Schipman**"
image: "images/hero-image.png"
designation: "Student Applied Computer Science"
institution: "Howest University of Applied Sciences"
description: "A professor of artificial intelligence at the Stanford AI Lab. I research interests include distributed robotics, mobile computing and programmable matter."
additional_info:
- title: "Email"
content: "jorenschipman@gmail.com"
- title: "Phone"
content: "+32456069255"
- title: "Age"
content: "21 years"
- title: "Languages"
content: "Dutch, English"
- title: "Address"
content: "Kapelseweg 58a, 2811 Mechelen"
button:
enable: true
label: "Download Resume"
isDownloadable: true
link: "#?"
# skill
skill:
enable: true
title: "My **Skills**"
skills:
- title: "Playing Science"
percentage: "95"
- title: "Arts And Craft"
percentage: "90"
- title: "Creative Writing"
percentage: "55"
- title: "English Lessons"
percentage: "95"
- title: "SQL"
percentage: "80"
- title: "Mongodb"
percentage: "95"
- title: "Tableau"
percentage: "75"
- title: "Stella Architect"
percentage: "90"
# experience
experience:
enable: true
title: "Experiences"
experience_list:
- title: "University of Eastern Finland"
duration: "Jan 2022 Present"
company: "Rolling Thunder"
icon: "fa-solid fa-pen-ruler"
description: |
Maecenas tempus faucibus rutrum. Duis eu aliquam urna. Proin vitae nulla tristique, ornare felis id congue libero.
- title: "University of Jyväskylä"
duration: "Jan 2020 Dec 2021"
company: "Apple Inc."
icon: "fa-solid fa-palette"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "University of Eastern Finland"
duration: "Jan 2016 Dec 2019"
company: "Google Inc."
icon: "fa-solid fa-laptop-code"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
# education
education:
enable: true
title: "Education"
education_list:
- title: "PhD in Statistics"
duration: "Jan 2021 to Dec 2022"
icon: "fa-solid fa-building-columns"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "MSc in Statistics"
description: ""
institution: ""
duration: "Jan 2019 - Dec 2020"
icon: "fa-solid fa-person-chalkboard"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
- title: "BSc in Statistics"
description: ""
institution: ""
duration: "Jan 2019 - Dec 2020"
icon: "fa-solid fa-graduation-cap"
description: |
Aliquam tincidunt malesuada tortor vitae iaculis. In eu turpis risus quis. Quisque fringilla mollis risus eu pulvinar.
# projects
projects:
enable: true
button:
link: "projects/"
label: "All Projects"
# blogs
blogs:
enable: true
button:
link: "blog/"
label: "All Blogs"
# contact
contact:
enable: true
title: "Get in Touch"
contact_info:
title: "Contact"
subtitle: "Fill up the form and our Team will get back to you within 24 hours."
contact_details:
- name: "Call"
icon: "fa-solid fa-phone-volume"
content: "[310-437-2766](tel:310-437-2766)"
- name: "Mail"
icon: "fa-solid fa-envelope"
content: "[williamson@gmail.com](mailto:williamson@gmail.com)"
- name: "Address"
icon: "fa-solid fa-location-dot"
content: "1901 Thornridge Cir. Shiloh, Hawaii"
- name: "Fax"
icon: "fa-solid fa-phone-volume"
content: "[555-123-4567](tel:555-123-4567)"
---

File diff suppressed because one or more lines are too long

View File

@ -1,82 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Recent Posts on Joren&#39;s Site</title>
<link>https://joren.blog/blog/</link>
<description>Recent content in Recent Posts on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/blog/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Alpine-Linux on Joren&#39;s Site</title>
<link>https://joren.blog/categories/alpine-linux/</link>
<description>Recent content in Alpine-Linux on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/alpine-linux/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Communication on Joren&#39;s Site</title>
<link>https://joren.blog/categories/communication/</link>
<description>Recent content in Communication on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/communication/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>CTF on Joren&#39;s Site</title>
<link>https://joren.blog/categories/ctf/</link>
<description>Recent content in CTF on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,68 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Cybersecurity on Joren&#39;s Site</title>
<link>https://joren.blog/categories/cybersecurity/</link>
<description>Recent content in Cybersecurity on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Decentralization on Joren&#39;s Site</title>
<link>https://joren.blog/categories/decentralization/</link>
<description>Recent content in Decentralization on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/decentralization/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Defense on Joren&#39;s Site</title>
<link>https://joren.blog/categories/defense/</link>
<description>Recent content in Defense on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/defense/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Dns on Joren&#39;s Site</title>
<link>https://joren.blog/categories/dns/</link>
<description>Recent content in Dns on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/dns/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Education on Joren&#39;s Site</title>
<link>https://joren.blog/categories/education/</link>
<description>Recent content in Education on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/education/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Event on Joren&#39;s Site</title>
<link>https://joren.blog/categories/event/</link>
<description>Recent content in Event on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/event/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Hardware on Joren&#39;s Site</title>
<link>https://joren.blog/categories/hardware/</link>
<description>Recent content in Hardware on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/hardware/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
</channel>
</rss>

View File

@ -1,2 +0,0 @@
<script>window.location.replace("\/");</script>

View File

@ -1,173 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Categories on Joren&#39;s Site</title>
<link>https://joren.blog/categories/</link>
<description>Recent content in Categories on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Alpine-Linux</title>
<link>https://joren.blog/categories/alpine-linux/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/alpine-linux/</guid>
<description></description>
</item>
<item>
<title>Communication</title>
<link>https://joren.blog/categories/communication/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/communication/</guid>
<description></description>
</item>
<item>
<title>Cybersecurity</title>
<link>https://joren.blog/categories/cybersecurity/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/cybersecurity/</guid>
<description></description>
</item>
<item>
<title>Decentralization</title>
<link>https://joren.blog/categories/decentralization/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/decentralization/</guid>
<description></description>
</item>
<item>
<title>Dns</title>
<link>https://joren.blog/categories/dns/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/dns/</guid>
<description></description>
</item>
<item>
<title>Hardware</title>
<link>https://joren.blog/categories/hardware/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/hardware/</guid>
<description></description>
</item>
<item>
<title>Iot</title>
<link>https://joren.blog/categories/iot/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/iot/</guid>
<description></description>
</item>
<item>
<title>Jdm</title>
<link>https://joren.blog/categories/jdm/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/jdm/</guid>
<description></description>
</item>
<item>
<title>Network</title>
<link>https://joren.blog/categories/network/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/network/</guid>
<description></description>
</item>
<item>
<title>Networking</title>
<link>https://joren.blog/categories/networking/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/networking/</guid>
<description></description>
</item>
<item>
<title>Offensive</title>
<link>https://joren.blog/categories/offensive/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/offensive/</guid>
<description></description>
</item>
<item>
<title>Reverse Engineering</title>
<link>https://joren.blog/categories/reverse-engineering/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/reverse-engineering/</guid>
<description></description>
</item>
<item>
<title>Seiko</title>
<link>https://joren.blog/categories/seiko/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/seiko/</guid>
<description></description>
</item>
<item>
<title>Self-Hosting</title>
<link>https://joren.blog/categories/self-hosting/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/self-hosting/</guid>
<description></description>
</item>
<item>
<title>Vpn</title>
<link>https://joren.blog/categories/vpn/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/vpn/</guid>
<description></description>
</item>
<item>
<title>Watches</title>
<link>https://joren.blog/categories/watches/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/watches/</guid>
<description></description>
</item>
<item>
<title>Windows</title>
<link>https://joren.blog/categories/windows/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/windows/</guid>
<description></description>
</item>
<item>
<title>Interview</title>
<link>https://joren.blog/categories/interview/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/interview/</guid>
<description></description>
</item>
<item>
<title>Podcast</title>
<link>https://joren.blog/categories/podcast/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/podcast/</guid>
<description></description>
</item>
<item>
<title>Event</title>
<link>https://joren.blog/categories/event/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/event/</guid>
<description></description>
</item>
<item>
<title>CTF</title>
<link>https://joren.blog/categories/ctf/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/ctf/</guid>
<description></description>
</item>
<item>
<title>Education</title>
<link>https://joren.blog/categories/education/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/education/</guid>
<description></description>
</item>
<item>
<title>Defense</title>
<link>https://joren.blog/categories/defense/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/defense/</guid>
<description></description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Interview on Joren&#39;s Site</title>
<link>https://joren.blog/categories/interview/</link>
<description>Recent content in Interview on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/interview/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Iot on Joren&#39;s Site</title>
<link>https://joren.blog/categories/iot/</link>
<description>Recent content in Iot on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/iot/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Jdm on Joren&#39;s Site</title>
<link>https://joren.blog/categories/jdm/</link>
<description>Recent content in Jdm on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/jdm/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Network on Joren&#39;s Site</title>
<link>https://joren.blog/categories/network/</link>
<description>Recent content in Network on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/network/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Networking on Joren&#39;s Site</title>
<link>https://joren.blog/categories/networking/</link>
<description>Recent content in Networking on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/networking/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,26 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Offensive on Joren&#39;s Site</title>
<link>https://joren.blog/categories/offensive/</link>
<description>Recent content in Offensive on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/offensive/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Podcast on Joren&#39;s Site</title>
<link>https://joren.blog/categories/podcast/</link>
<description>Recent content in Podcast on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Reverse Engineering on Joren&#39;s Site</title>
<link>https://joren.blog/categories/reverse-engineering/</link>
<description>Recent content in Reverse Engineering on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Seiko on Joren&#39;s Site</title>
<link>https://joren.blog/categories/seiko/</link>
<description>Recent content in Seiko on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/seiko/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Self-Hosting on Joren&#39;s Site</title>
<link>https://joren.blog/categories/self-hosting/</link>
<description>Recent content in Self-Hosting on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/self-hosting/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Vpn on Joren&#39;s Site</title>
<link>https://joren.blog/categories/vpn/</link>
<description>Recent content in Vpn on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/vpn/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>https://joren.blog/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Watches on Joren&#39;s Site</title>
<link>https://joren.blog/categories/watches/</link>
<description>Recent content in Watches on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/watches/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -1,19 +0,0 @@
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Windows on Joren&#39;s Site</title>
<link>https://joren.blog/categories/windows/</link>
<description>Recent content in Windows on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/windows/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because it is too large Load Diff

Binary file not shown.

Before

Width:  |  Height:  |  Size: 57 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 143 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 60 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 54 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 36 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 97 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 133 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 42 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 32 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 95 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 56 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 43 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 84 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 89 KiB

Some files were not shown because too many files have changed in this diff Show More