ye
This commit is contained in:
parent
25d9149aaa
commit
7764a454d8
Binary file not shown.
Before Width: | Height: | Size: 34 KiB After Width: | Height: | Size: 799 KiB |
@ -13,12 +13,12 @@ banner:
|
|||||||
I'm Joren Schipman, a 21-year-old student with a deep passion for cybersecurity, hardware hacking, and solving complex problems through code. I thrive in collaborative environments, value curiosity, and actively pursue hands-on learning to build secure and innovative technology.
|
I'm Joren Schipman, a 21-year-old student with a deep passion for cybersecurity, hardware hacking, and solving complex problems through code. I thrive in collaborative environments, value curiosity, and actively pursue hands-on learning to build secure and innovative technology.
|
||||||
|
|
||||||
additional_info:
|
additional_info:
|
||||||
- title: "Email"
|
|
||||||
content: "jorensc@riseup.net"
|
|
||||||
- title: "Age"
|
- title: "Age"
|
||||||
content: "21 years"
|
content: "21 years"
|
||||||
- title: "Languages"
|
- title: "Languages"
|
||||||
content: "Dutch, English, French"
|
content: "Dutch, English, French"
|
||||||
|
- title: "Email"
|
||||||
|
content: "jorensc@riseup.net"
|
||||||
- title: "Phone"
|
- title: "Phone"
|
||||||
content: "+32 456 06 92 55"
|
content: "+32 456 06 92 55"
|
||||||
- title: "Location"
|
- title: "Location"
|
||||||
@ -60,26 +60,19 @@ experience:
|
|||||||
title: "Experiences"
|
title: "Experiences"
|
||||||
experience_list:
|
experience_list:
|
||||||
- title: "Cybersecurity Intern"
|
- title: "Cybersecurity Intern"
|
||||||
duration: "Feb 2025 – May 2025"
|
duration: "Feb 2025 - May 2025"
|
||||||
company: "Initeam, Izegem"
|
company: "Initeam, Izegem"
|
||||||
icon: "fa-solid fa-shield-halved"
|
icon: "fa-solid fa-shield-halved"
|
||||||
description: >
|
description: >
|
||||||
Worked as part of the internal IT and security team focusing on pentesting, SIEM setup, and detection rule testing. Gained practical experience in threat analysis, vulnerability assessments, and configuring security monitoring tools in a real-world business environment.
|
Worked as part of the internal IT and security team focusing on pentesting, SIEM setup, and detection rule testing. Gained practical experience in threat analysis, vulnerability assessments, and configuring security monitoring tools in a real-world business environment.
|
||||||
|
|
||||||
- title: "IT Student Worker"
|
- title: "IT Student Worker"
|
||||||
duration: "Jun 2022 – Aug 2022"
|
duration: "Jun 2022 - Aug 2022"
|
||||||
company: "CAPAC/HVW, Brussels"
|
company: "CAPAC/HVW, Brussels"
|
||||||
icon: "fa-solid fa-network-wired"
|
icon: "fa-solid fa-network-wired"
|
||||||
description: >
|
description: >
|
||||||
Provided first-line support in a government IT department, managing user accounts in Active Directory, performing hardware repairs, and handling end-user issues with professionalism and efficiency.
|
Provided first-line support in a government IT department, managing user accounts in Active Directory, performing hardware repairs, and handling end-user issues with professionalism and efficiency.
|
||||||
|
|
||||||
- title: "IT Intern"
|
|
||||||
duration: "2021 – 2022"
|
|
||||||
company: "CAPAC/HVW, Brussels"
|
|
||||||
icon: "fa-solid fa-screwdriver-wrench"
|
|
||||||
description: >
|
|
||||||
Contributed to laptop renewal initiatives and user onboarding. Gained practical exposure to enterprise IT operations, helpdesk workflows, and deployment automation.
|
|
||||||
|
|
||||||
|
|
||||||
# education
|
# education
|
||||||
education:
|
education:
|
||||||
@ -87,26 +80,19 @@ education:
|
|||||||
title: "Education"
|
title: "Education"
|
||||||
education_list:
|
education_list:
|
||||||
- title: "Bachelor in Applied Computer Science - Cybersecurity"
|
- title: "Bachelor in Applied Computer Science - Cybersecurity"
|
||||||
duration: "2022 – Present"
|
duration: "2022 - Present"
|
||||||
institution: "Howest University of Applied Sciences"
|
institution: "Howest University of Applied Sciences"
|
||||||
icon: "fa-solid fa-building-columns"
|
icon: "fa-solid fa-building-columns"
|
||||||
description: >
|
description: >
|
||||||
Focused on secure software development, ethical hacking, digital forensics, and network defense. Regularly participate in cybersecurity labs and capture-the-flag (CTF) events to hone hands-on skills.
|
Focused on secure software development, ethical hacking, digital forensics, and network defense. Regularly participate in cybersecurity labs and capture-the-flag (CTF) events to hone hands-on skills.
|
||||||
|
|
||||||
- title: "Industrial ICT"
|
- title: "Industrial ICT"
|
||||||
duration: "2020 – 2022"
|
duration: "2020 - 2022"
|
||||||
institution: "Technische Scholen Mechelen"
|
institution: "Technische Scholen Mechelen"
|
||||||
icon: "fa-solid fa-person-chalkboard"
|
icon: "fa-solid fa-person-chalkboard"
|
||||||
description: >
|
description: >
|
||||||
Developed a strong foundation in embedded systems, networking, and software-hardware interfacing. Engaged in technical projects that integrated electronics with programming.
|
Developed a strong foundation in embedded systems, networking, and software-hardware interfacing. Engaged in technical projects that integrated electronics with programming.
|
||||||
|
|
||||||
- title: "Secondary Education - Mathematics and Sciences"
|
|
||||||
duration: "2016 – 2020"
|
|
||||||
institution: "Busleyden Atheneum - campus Pitzemburg"
|
|
||||||
icon: "fa-solid fa-graduation-cap"
|
|
||||||
description: >
|
|
||||||
Solid academic training in analytical thinking, logic, and scientific methodology. Sparked initial interest in computing and problem-solving.
|
|
||||||
|
|
||||||
|
|
||||||
# projects
|
# projects
|
||||||
projects:
|
projects:
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,80 +2,80 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Recent Posts on Joren's Site</title>
|
<title>Recent Posts on Joren's Site</title>
|
||||||
<link>http://localhost:1313/blog/</link>
|
<link>https://joren.blog/blog/</link>
|
||||||
<description>Recent content in Recent Posts on Joren's Site</description>
|
<description>Recent content in Recent Posts on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/blog/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/blog/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
<link>http://localhost:1313/blog/post-8/</link>
|
<link>https://joren.blog/blog/post-8/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-8/</guid>
|
<guid>https://joren.blog/blog/post-8/</guid>
|
||||||
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
<link>http://localhost:1313/blog/post-7/</link>
|
<link>https://joren.blog/blog/post-7/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-7/</guid>
|
<guid>https://joren.blog/blog/post-7/</guid>
|
||||||
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Matrix: Building a Decentralized Communication Future</title>
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
<link>http://localhost:1313/blog/post-6/</link>
|
<link>https://joren.blog/blog/post-6/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-6/</guid>
|
<guid>https://joren.blog/blog/post-6/</guid>
|
||||||
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
<link>http://localhost:1313/blog/post-9/</link>
|
<link>https://joren.blog/blog/post-9/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-9/</guid>
|
<guid>https://joren.blog/blog/post-9/</guid>
|
||||||
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
<link>http://localhost:1313/blog/post-5/</link>
|
<link>https://joren.blog/blog/post-5/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-5/</guid>
|
<guid>https://joren.blog/blog/post-5/</guid>
|
||||||
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
<link>http://localhost:1313/blog/post-10/</link>
|
<link>https://joren.blog/blog/post-10/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-10/</guid>
|
<guid>https://joren.blog/blog/post-10/</guid>
|
||||||
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>http://localhost:1313/blog/post-4/</link>
|
<link>https://joren.blog/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-4/</guid>
|
<guid>https://joren.blog/blog/post-4/</guid>
|
||||||
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>http://localhost:1313/blog/post-1/</link>
|
<link>https://joren.blog/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-1/</guid>
|
<guid>https://joren.blog/blog/post-1/</guid>
|
||||||
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>http://localhost:1313/blog/post-2/</link>
|
<link>https://joren.blog/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-2/</guid>
|
<guid>https://joren.blog/blog/post-2/</guid>
|
||||||
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>http://localhost:1313/blog/post-3/</link>
|
<link>https://joren.blog/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-3/</guid>
|
<guid>https://joren.blog/blog/post-3/</guid>
|
||||||
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Alpine-Linux on Joren's Site</title>
|
<title>Alpine-Linux on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/alpine-linux/</link>
|
<link>https://joren.blog/categories/alpine-linux/</link>
|
||||||
<description>Recent content in Alpine-Linux on Joren's Site</description>
|
<description>Recent content in Alpine-Linux on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/alpine-linux/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/alpine-linux/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Communication on Joren's Site</title>
|
<title>Communication on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/communication/</link>
|
<link>https://joren.blog/categories/communication/</link>
|
||||||
<description>Recent content in Communication on Joren's Site</description>
|
<description>Recent content in Communication on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/communication/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/communication/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Matrix: Building a Decentralized Communication Future</title>
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
<link>http://localhost:1313/blog/post-6/</link>
|
<link>https://joren.blog/blog/post-6/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-6/</guid>
|
<guid>https://joren.blog/blog/post-6/</guid>
|
||||||
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>CTF on Joren's Site</title>
|
<title>CTF on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/ctf/</link>
|
<link>https://joren.blog/categories/ctf/</link>
|
||||||
<description>Recent content in CTF on Joren's Site</description>
|
<description>Recent content in CTF on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>http://localhost:1313/blog/post-2/</link>
|
<link>https://joren.blog/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-2/</guid>
|
<guid>https://joren.blog/blog/post-2/</guid>
|
||||||
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,66 +2,66 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Cybersecurity on Joren's Site</title>
|
<title>Cybersecurity on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/cybersecurity/</link>
|
<link>https://joren.blog/categories/cybersecurity/</link>
|
||||||
<description>Recent content in Cybersecurity on Joren's Site</description>
|
<description>Recent content in Cybersecurity on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
<link>http://localhost:1313/blog/post-7/</link>
|
<link>https://joren.blog/blog/post-7/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-7/</guid>
|
<guid>https://joren.blog/blog/post-7/</guid>
|
||||||
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Matrix: Building a Decentralized Communication Future</title>
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
<link>http://localhost:1313/blog/post-6/</link>
|
<link>https://joren.blog/blog/post-6/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-6/</guid>
|
<guid>https://joren.blog/blog/post-6/</guid>
|
||||||
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
<link>http://localhost:1313/blog/post-5/</link>
|
<link>https://joren.blog/blog/post-5/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-5/</guid>
|
<guid>https://joren.blog/blog/post-5/</guid>
|
||||||
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
<link>http://localhost:1313/blog/post-10/</link>
|
<link>https://joren.blog/blog/post-10/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-10/</guid>
|
<guid>https://joren.blog/blog/post-10/</guid>
|
||||||
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>http://localhost:1313/blog/post-4/</link>
|
<link>https://joren.blog/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-4/</guid>
|
<guid>https://joren.blog/blog/post-4/</guid>
|
||||||
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>http://localhost:1313/blog/post-1/</link>
|
<link>https://joren.blog/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-1/</guid>
|
<guid>https://joren.blog/blog/post-1/</guid>
|
||||||
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>http://localhost:1313/blog/post-2/</link>
|
<link>https://joren.blog/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-2/</guid>
|
<guid>https://joren.blog/blog/post-2/</guid>
|
||||||
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>http://localhost:1313/blog/post-3/</link>
|
<link>https://joren.blog/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-3/</guid>
|
<guid>https://joren.blog/blog/post-3/</guid>
|
||||||
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Decentralization on Joren's Site</title>
|
<title>Decentralization on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/decentralization/</link>
|
<link>https://joren.blog/categories/decentralization/</link>
|
||||||
<description>Recent content in Decentralization on Joren's Site</description>
|
<description>Recent content in Decentralization on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/decentralization/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/decentralization/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Matrix: Building a Decentralized Communication Future</title>
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
<link>http://localhost:1313/blog/post-6/</link>
|
<link>https://joren.blog/blog/post-6/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-6/</guid>
|
<guid>https://joren.blog/blog/post-6/</guid>
|
||||||
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Defense on Joren's Site</title>
|
<title>Defense on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/defense/</link>
|
<link>https://joren.blog/categories/defense/</link>
|
||||||
<description>Recent content in Defense on Joren's Site</description>
|
<description>Recent content in Defense on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/defense/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/defense/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>http://localhost:1313/blog/post-3/</link>
|
<link>https://joren.blog/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-3/</guid>
|
<guid>https://joren.blog/blog/post-3/</guid>
|
||||||
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Dns on Joren's Site</title>
|
<title>Dns on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/dns/</link>
|
<link>https://joren.blog/categories/dns/</link>
|
||||||
<description>Recent content in Dns on Joren's Site</description>
|
<description>Recent content in Dns on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/dns/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/dns/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Education on Joren's Site</title>
|
<title>Education on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/education/</link>
|
<link>https://joren.blog/categories/education/</link>
|
||||||
<description>Recent content in Education on Joren's Site</description>
|
<description>Recent content in Education on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/education/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/education/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>http://localhost:1313/blog/post-2/</link>
|
<link>https://joren.blog/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-2/</guid>
|
<guid>https://joren.blog/blog/post-2/</guid>
|
||||||
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,24 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Event on Joren's Site</title>
|
<title>Event on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/event/</link>
|
<link>https://joren.blog/categories/event/</link>
|
||||||
<description>Recent content in Event on Joren's Site</description>
|
<description>Recent content in Event on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/event/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/event/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>http://localhost:1313/blog/post-1/</link>
|
<link>https://joren.blog/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-1/</guid>
|
<guid>https://joren.blog/blog/post-1/</guid>
|
||||||
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>http://localhost:1313/blog/post-3/</link>
|
<link>https://joren.blog/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-3/</guid>
|
<guid>https://joren.blog/blog/post-3/</guid>
|
||||||
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Hardware on Joren's Site</title>
|
<title>Hardware on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/hardware/</link>
|
<link>https://joren.blog/categories/hardware/</link>
|
||||||
<description>Recent content in Hardware on Joren's Site</description>
|
<description>Recent content in Hardware on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/hardware/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/hardware/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
<link>http://localhost:1313/blog/post-8/</link>
|
<link>https://joren.blog/blog/post-8/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-8/</guid>
|
<guid>https://joren.blog/blog/post-8/</guid>
|
||||||
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
|
|
||||||
<script src="/livereload.js?mindelay=10&v=2&port=1313&path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>
|
<script>window.location.replace("\/");</script>
|
||||||
|
@ -2,171 +2,171 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Categories on Joren's Site</title>
|
<title>Categories on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/</link>
|
<link>https://joren.blog/categories/</link>
|
||||||
<description>Recent content in Categories on Joren's Site</description>
|
<description>Recent content in Categories on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Alpine-Linux</title>
|
<title>Alpine-Linux</title>
|
||||||
<link>http://localhost:1313/categories/alpine-linux/</link>
|
<link>https://joren.blog/categories/alpine-linux/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/alpine-linux/</guid>
|
<guid>https://joren.blog/categories/alpine-linux/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Communication</title>
|
<title>Communication</title>
|
||||||
<link>http://localhost:1313/categories/communication/</link>
|
<link>https://joren.blog/categories/communication/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/communication/</guid>
|
<guid>https://joren.blog/categories/communication/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cybersecurity</title>
|
<title>Cybersecurity</title>
|
||||||
<link>http://localhost:1313/categories/cybersecurity/</link>
|
<link>https://joren.blog/categories/cybersecurity/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/cybersecurity/</guid>
|
<guid>https://joren.blog/categories/cybersecurity/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Decentralization</title>
|
<title>Decentralization</title>
|
||||||
<link>http://localhost:1313/categories/decentralization/</link>
|
<link>https://joren.blog/categories/decentralization/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/decentralization/</guid>
|
<guid>https://joren.blog/categories/decentralization/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Dns</title>
|
<title>Dns</title>
|
||||||
<link>http://localhost:1313/categories/dns/</link>
|
<link>https://joren.blog/categories/dns/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/dns/</guid>
|
<guid>https://joren.blog/categories/dns/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Hardware</title>
|
<title>Hardware</title>
|
||||||
<link>http://localhost:1313/categories/hardware/</link>
|
<link>https://joren.blog/categories/hardware/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/hardware/</guid>
|
<guid>https://joren.blog/categories/hardware/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Iot</title>
|
<title>Iot</title>
|
||||||
<link>http://localhost:1313/categories/iot/</link>
|
<link>https://joren.blog/categories/iot/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/iot/</guid>
|
<guid>https://joren.blog/categories/iot/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Jdm</title>
|
<title>Jdm</title>
|
||||||
<link>http://localhost:1313/categories/jdm/</link>
|
<link>https://joren.blog/categories/jdm/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/jdm/</guid>
|
<guid>https://joren.blog/categories/jdm/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Network</title>
|
<title>Network</title>
|
||||||
<link>http://localhost:1313/categories/network/</link>
|
<link>https://joren.blog/categories/network/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/network/</guid>
|
<guid>https://joren.blog/categories/network/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Networking</title>
|
<title>Networking</title>
|
||||||
<link>http://localhost:1313/categories/networking/</link>
|
<link>https://joren.blog/categories/networking/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/networking/</guid>
|
<guid>https://joren.blog/categories/networking/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Offensive</title>
|
<title>Offensive</title>
|
||||||
<link>http://localhost:1313/categories/offensive/</link>
|
<link>https://joren.blog/categories/offensive/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/offensive/</guid>
|
<guid>https://joren.blog/categories/offensive/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reverse Engineering</title>
|
<title>Reverse Engineering</title>
|
||||||
<link>http://localhost:1313/categories/reverse-engineering/</link>
|
<link>https://joren.blog/categories/reverse-engineering/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/reverse-engineering/</guid>
|
<guid>https://joren.blog/categories/reverse-engineering/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Seiko</title>
|
<title>Seiko</title>
|
||||||
<link>http://localhost:1313/categories/seiko/</link>
|
<link>https://joren.blog/categories/seiko/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/seiko/</guid>
|
<guid>https://joren.blog/categories/seiko/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Self-Hosting</title>
|
<title>Self-Hosting</title>
|
||||||
<link>http://localhost:1313/categories/self-hosting/</link>
|
<link>https://joren.blog/categories/self-hosting/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/self-hosting/</guid>
|
<guid>https://joren.blog/categories/self-hosting/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Vpn</title>
|
<title>Vpn</title>
|
||||||
<link>http://localhost:1313/categories/vpn/</link>
|
<link>https://joren.blog/categories/vpn/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/vpn/</guid>
|
<guid>https://joren.blog/categories/vpn/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Watches</title>
|
<title>Watches</title>
|
||||||
<link>http://localhost:1313/categories/watches/</link>
|
<link>https://joren.blog/categories/watches/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/watches/</guid>
|
<guid>https://joren.blog/categories/watches/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Windows</title>
|
<title>Windows</title>
|
||||||
<link>http://localhost:1313/categories/windows/</link>
|
<link>https://joren.blog/categories/windows/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/windows/</guid>
|
<guid>https://joren.blog/categories/windows/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Interview</title>
|
<title>Interview</title>
|
||||||
<link>http://localhost:1313/categories/interview/</link>
|
<link>https://joren.blog/categories/interview/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/interview/</guid>
|
<guid>https://joren.blog/categories/interview/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Podcast</title>
|
<title>Podcast</title>
|
||||||
<link>http://localhost:1313/categories/podcast/</link>
|
<link>https://joren.blog/categories/podcast/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/podcast/</guid>
|
<guid>https://joren.blog/categories/podcast/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Event</title>
|
<title>Event</title>
|
||||||
<link>http://localhost:1313/categories/event/</link>
|
<link>https://joren.blog/categories/event/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/event/</guid>
|
<guid>https://joren.blog/categories/event/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>CTF</title>
|
<title>CTF</title>
|
||||||
<link>http://localhost:1313/categories/ctf/</link>
|
<link>https://joren.blog/categories/ctf/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/ctf/</guid>
|
<guid>https://joren.blog/categories/ctf/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Education</title>
|
<title>Education</title>
|
||||||
<link>http://localhost:1313/categories/education/</link>
|
<link>https://joren.blog/categories/education/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/education/</guid>
|
<guid>https://joren.blog/categories/education/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Defense</title>
|
<title>Defense</title>
|
||||||
<link>http://localhost:1313/categories/defense/</link>
|
<link>https://joren.blog/categories/defense/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/categories/defense/</guid>
|
<guid>https://joren.blog/categories/defense/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Interview on Joren's Site</title>
|
<title>Interview on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/interview/</link>
|
<link>https://joren.blog/categories/interview/</link>
|
||||||
<description>Recent content in Interview on Joren's Site</description>
|
<description>Recent content in Interview on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/interview/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/interview/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>http://localhost:1313/blog/post-4/</link>
|
<link>https://joren.blog/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-4/</guid>
|
<guid>https://joren.blog/blog/post-4/</guid>
|
||||||
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,24 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Iot on Joren's Site</title>
|
<title>Iot on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/iot/</link>
|
<link>https://joren.blog/categories/iot/</link>
|
||||||
<description>Recent content in Iot on Joren's Site</description>
|
<description>Recent content in Iot on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/iot/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/iot/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
<link>http://localhost:1313/blog/post-8/</link>
|
<link>https://joren.blog/blog/post-8/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-8/</guid>
|
<guid>https://joren.blog/blog/post-8/</guid>
|
||||||
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
<link>http://localhost:1313/blog/post-10/</link>
|
<link>https://joren.blog/blog/post-10/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-10/</guid>
|
<guid>https://joren.blog/blog/post-10/</guid>
|
||||||
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Jdm on Joren's Site</title>
|
<title>Jdm on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/jdm/</link>
|
<link>https://joren.blog/categories/jdm/</link>
|
||||||
<description>Recent content in Jdm on Joren's Site</description>
|
<description>Recent content in Jdm on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/jdm/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/jdm/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
<link>http://localhost:1313/blog/post-9/</link>
|
<link>https://joren.blog/blog/post-9/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-9/</guid>
|
<guid>https://joren.blog/blog/post-9/</guid>
|
||||||
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Network on Joren's Site</title>
|
<title>Network on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/network/</link>
|
<link>https://joren.blog/categories/network/</link>
|
||||||
<description>Recent content in Network on Joren's Site</description>
|
<description>Recent content in Network on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/network/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/network/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
<link>http://localhost:1313/blog/post-5/</link>
|
<link>https://joren.blog/blog/post-5/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-5/</guid>
|
<guid>https://joren.blog/blog/post-5/</guid>
|
||||||
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,24 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Networking on Joren's Site</title>
|
<title>Networking on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/networking/</link>
|
<link>https://joren.blog/categories/networking/</link>
|
||||||
<description>Recent content in Networking on Joren's Site</description>
|
<description>Recent content in Networking on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/networking/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/networking/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
<link>http://localhost:1313/blog/post-10/</link>
|
<link>https://joren.blog/blog/post-10/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-10/</guid>
|
<guid>https://joren.blog/blog/post-10/</guid>
|
||||||
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
<description><p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,24 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Offensive on Joren's Site</title>
|
<title>Offensive on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/offensive/</link>
|
<link>https://joren.blog/categories/offensive/</link>
|
||||||
<description>Recent content in Offensive on Joren's Site</description>
|
<description>Recent content in Offensive on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/offensive/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/offensive/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
<link>http://localhost:1313/blog/post-7/</link>
|
<link>https://joren.blog/blog/post-7/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-7/</guid>
|
<guid>https://joren.blog/blog/post-7/</guid>
|
||||||
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
<link>http://localhost:1313/blog/post-5/</link>
|
<link>https://joren.blog/blog/post-5/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-5/</guid>
|
<guid>https://joren.blog/blog/post-5/</guid>
|
||||||
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Podcast on Joren's Site</title>
|
<title>Podcast on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/podcast/</link>
|
<link>https://joren.blog/categories/podcast/</link>
|
||||||
<description>Recent content in Podcast on Joren's Site</description>
|
<description>Recent content in Podcast on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>http://localhost:1313/blog/post-4/</link>
|
<link>https://joren.blog/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-4/</guid>
|
<guid>https://joren.blog/blog/post-4/</guid>
|
||||||
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Reverse Engineering on Joren's Site</title>
|
<title>Reverse Engineering on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/reverse-engineering/</link>
|
<link>https://joren.blog/categories/reverse-engineering/</link>
|
||||||
<description>Recent content in Reverse Engineering on Joren's Site</description>
|
<description>Recent content in Reverse Engineering on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
<link>http://localhost:1313/blog/post-8/</link>
|
<link>https://joren.blog/blog/post-8/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-8/</guid>
|
<guid>https://joren.blog/blog/post-8/</guid>
|
||||||
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Seiko on Joren's Site</title>
|
<title>Seiko on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/seiko/</link>
|
<link>https://joren.blog/categories/seiko/</link>
|
||||||
<description>Recent content in Seiko on Joren's Site</description>
|
<description>Recent content in Seiko on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/seiko/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/seiko/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
<link>http://localhost:1313/blog/post-9/</link>
|
<link>https://joren.blog/blog/post-9/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-9/</guid>
|
<guid>https://joren.blog/blog/post-9/</guid>
|
||||||
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Self-Hosting on Joren's Site</title>
|
<title>Self-Hosting on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/self-hosting/</link>
|
<link>https://joren.blog/categories/self-hosting/</link>
|
||||||
<description>Recent content in Self-Hosting on Joren's Site</description>
|
<description>Recent content in Self-Hosting on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/self-hosting/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/self-hosting/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Vpn on Joren's Site</title>
|
<title>Vpn on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/vpn/</link>
|
<link>https://joren.blog/categories/vpn/</link>
|
||||||
<description>Recent content in Vpn on Joren's Site</description>
|
<description>Recent content in Vpn on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/vpn/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/vpn/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Watches on Joren's Site</title>
|
<title>Watches on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/watches/</link>
|
<link>https://joren.blog/categories/watches/</link>
|
||||||
<description>Recent content in Watches on Joren's Site</description>
|
<description>Recent content in Watches on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/watches/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/watches/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
<link>http://localhost:1313/blog/post-9/</link>
|
<link>https://joren.blog/blog/post-9/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-9/</guid>
|
<guid>https://joren.blog/blog/post-9/</guid>
|
||||||
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Windows on Joren's Site</title>
|
<title>Windows on Joren's Site</title>
|
||||||
<link>http://localhost:1313/categories/windows/</link>
|
<link>https://joren.blog/categories/windows/</link>
|
||||||
<description>Recent content in Windows on Joren's Site</description>
|
<description>Recent content in Windows on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/categories/windows/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/categories/windows/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
<link>http://localhost:1313/blog/post-7/</link>
|
<link>https://joren.blog/blog/post-7/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/blog/post-7/</guid>
|
<guid>https://joren.blog/blog/post-7/</guid>
|
||||||
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
@ -452,27 +452,27 @@
|
|||||||
<picture>
|
<picture>
|
||||||
<source
|
<source
|
||||||
|
|
||||||
srcset="/images/hero-image_hu_36197af306728e84.webp"
|
srcset="/images/hero-image_hu_8c1d3aa67945b200.webp"
|
||||||
|
|
||||||
media="(max-width: 575px)" />
|
media="(max-width: 575px)" />
|
||||||
<source
|
<source
|
||||||
|
|
||||||
srcset="/images/hero-image_hu_fc75bde071e5f902.webp"
|
srcset="/images/hero-image_hu_90dc54d2f0867530.webp"
|
||||||
|
|
||||||
media="(max-width: 767px)" />
|
media="(max-width: 767px)" />
|
||||||
<source
|
<source
|
||||||
|
|
||||||
srcset="/images/hero-image_hu_4f94d346441e63a5.webp"
|
srcset="/images/hero-image_hu_7a4444e698d031e4.webp"
|
||||||
|
|
||||||
media="(max-width: 991px)" />
|
media="(max-width: 991px)" />
|
||||||
<source
|
<source
|
||||||
|
|
||||||
srcset="/images/hero-image_hu_9dee81c1cbaa9dbb.webp"
|
srcset="/images/hero-image_hu_cdef425005d9c51c.webp"
|
||||||
/>
|
/>
|
||||||
<img
|
<img
|
||||||
|
|
||||||
loading="lazy" decoding="async"
|
loading="lazy" decoding="async"
|
||||||
src="/images/hero-image_hu_76eefdaa9f5983fd.png"
|
src="/images/hero-image_hu_60234e78a8c6a3b0.png"
|
||||||
class=" rounded-2 w-100 img"
|
class=" rounded-2 w-100 img"
|
||||||
alt="I'm **Joren Schipman**"
|
alt="I'm **Joren Schipman**"
|
||||||
width="816"
|
width="816"
|
||||||
@ -517,11 +517,6 @@
|
|||||||
<table class="additional-info">
|
<table class="additional-info">
|
||||||
<tbody>
|
<tbody>
|
||||||
|
|
||||||
<tr>
|
|
||||||
<td>Email</td>
|
|
||||||
<td>jorensc@riseup.net</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Age</td>
|
<td>Age</td>
|
||||||
<td>21 years</td>
|
<td>21 years</td>
|
||||||
@ -532,6 +527,11 @@
|
|||||||
<td>Dutch, English, French</td>
|
<td>Dutch, English, French</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
|
<tr>
|
||||||
|
<td>Email</td>
|
||||||
|
<td>jorensc@riseup.net</td>
|
||||||
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Phone</td>
|
<td>Phone</td>
|
||||||
<td>+32 456 06 92 55</td>
|
<td>+32 456 06 92 55</td>
|
||||||
@ -849,7 +849,7 @@
|
|||||||
|
|
||||||
<small
|
<small
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
||||||
>Feb 2025 – May 2025
|
>Feb 2025 - May 2025
|
||||||
</small>
|
</small>
|
||||||
|
|
||||||
|
|
||||||
@ -888,7 +888,7 @@
|
|||||||
|
|
||||||
<small
|
<small
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
||||||
>Jun 2022 – Aug 2022
|
>Jun 2022 - Aug 2022
|
||||||
</small>
|
</small>
|
||||||
|
|
||||||
|
|
||||||
@ -899,45 +899,6 @@
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div
|
|
||||||
class="card border bg-dark rounded-3 pt-0 overflow-hidden">
|
|
||||||
|
|
||||||
<div
|
|
||||||
class="icon rounded-2 mb-4"
|
|
||||||
data-aos="fade-in"
|
|
||||||
data-aos-duration="500">
|
|
||||||
<i class="fa-solid fa-screwdriver-wrench"></i>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<div
|
|
||||||
class="card-body p-0"
|
|
||||||
data-aos="fade-up"
|
|
||||||
data-aos-delay="50">
|
|
||||||
<h4 class="card-title mb-2 h5 fw-medium">
|
|
||||||
IT Intern
|
|
||||||
</h4>
|
|
||||||
|
|
||||||
<p class="d-inline-block me-2">
|
|
||||||
CAPAC/HVW, Brussels
|
|
||||||
</p>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<small
|
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
|
||||||
>2021 – 2022
|
|
||||||
</small>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<div class="content mt-2">Contributed to laptop renewal initiatives and user onboarding. Gained practical exposure to enterprise IT operations, helpdesk workflows, and deployment automation.
|
|
||||||
</div>
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -972,11 +933,15 @@
|
|||||||
Bachelor in Applied Computer Science - Cybersecurity
|
Bachelor in Applied Computer Science - Cybersecurity
|
||||||
</h4>
|
</h4>
|
||||||
|
|
||||||
|
<p class="d-inline-block me-2">
|
||||||
|
Howest University of Applied Sciences
|
||||||
|
</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<small
|
<small
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
||||||
>2022 – Present
|
>2022 - Present
|
||||||
</small>
|
</small>
|
||||||
|
|
||||||
|
|
||||||
@ -1005,11 +970,15 @@
|
|||||||
Industrial ICT
|
Industrial ICT
|
||||||
</h4>
|
</h4>
|
||||||
|
|
||||||
|
<p class="d-inline-block me-2">
|
||||||
|
Technische Scholen Mechelen
|
||||||
|
</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<small
|
<small
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
||||||
>2020 – 2022
|
>2020 - 2022
|
||||||
</small>
|
</small>
|
||||||
|
|
||||||
|
|
||||||
@ -1020,39 +989,6 @@
|
|||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div
|
|
||||||
class="card border bg-dark rounded-3 pt-0 overflow-hidden">
|
|
||||||
|
|
||||||
<div
|
|
||||||
class="icon rounded-2 mb-4"
|
|
||||||
data-aos="fade-in"
|
|
||||||
data-aos-duration="500"
|
|
||||||
data-aos-delay="150">
|
|
||||||
<i class="fa-solid fa-graduation-cap"></i>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<div class="card-body p-0" data-aos="fade-up">
|
|
||||||
<h4 class="card-title mb-2 h5 fw-medium">
|
|
||||||
Secondary Education - Mathematics and Sciences
|
|
||||||
</h4>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<small
|
|
||||||
class="bg-primary-soft px-2 rounded-1 d-inline-block text-white mb-2"
|
|
||||||
>2016 – 2020
|
|
||||||
</small>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<div class="content mt-2">Solid academic training in analytical thinking, logic, and scientific methodology. Sparked initial interest in computing and problem-solving.
|
|
||||||
</div>
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,31 +2,31 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Recent Projects on Joren's Site</title>
|
<title>Recent Projects on Joren's Site</title>
|
||||||
<link>http://localhost:1313/project/</link>
|
<link>https://joren.blog/project/</link>
|
||||||
<description>Recent content in Recent Projects on Joren's Site</description>
|
<description>Recent content in Recent Projects on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="http://localhost:1313/project/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/project/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
<link>http://localhost:1313/project/project-3/</link>
|
<link>https://joren.blog/project/project-3/</link>
|
||||||
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-3/</guid>
|
<guid>https://joren.blog/project/project-3/</guid>
|
||||||
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Building My Hugo Website on a VPS</title>
|
<title>Building My Hugo Website on a VPS</title>
|
||||||
<link>http://localhost:1313/project/project-2/</link>
|
<link>https://joren.blog/project/project-2/</link>
|
||||||
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-2/</guid>
|
<guid>https://joren.blog/project/project-2/</guid>
|
||||||
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>DRMDTool Project</title>
|
<title>DRMDTool Project</title>
|
||||||
<link>http://localhost:1313/project/project-1/</link>
|
<link>https://joren.blog/project/project-1/</link>
|
||||||
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>http://localhost:1313/project/project-1/</guid>
|
<guid>https://joren.blog/project/project-1/</guid>
|
||||||
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,126 +2,126 @@
|
|||||||
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
|
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
|
||||||
xmlns:xhtml="http://www.w3.org/1999/xhtml">
|
xmlns:xhtml="http://www.w3.org/1999/xhtml">
|
||||||
<url>
|
<url>
|
||||||
<loc>http://localhost:1313/categories/alpine-linux/</loc>
|
<loc>https://joren.blog/categories/alpine-linux/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/</loc>
|
<loc>https://joren.blog/categories/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-8/</loc>
|
<loc>https://joren.blog/blog/post-8/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/communication/</loc>
|
<loc>https://joren.blog/categories/communication/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/cybersecurity/</loc>
|
<loc>https://joren.blog/categories/cybersecurity/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/decentralization/</loc>
|
<loc>https://joren.blog/categories/decentralization/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/dns/</loc>
|
<loc>https://joren.blog/categories/dns/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/hardware/</loc>
|
<loc>https://joren.blog/categories/hardware/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/</loc>
|
<loc>https://joren.blog/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/iot/</loc>
|
<loc>https://joren.blog/categories/iot/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/jdm/</loc>
|
<loc>https://joren.blog/categories/jdm/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-7/</loc>
|
<loc>https://joren.blog/blog/post-7/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/project/project-3/</loc>
|
<loc>https://joren.blog/project/project-3/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-6/</loc>
|
<loc>https://joren.blog/blog/post-6/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/network/</loc>
|
<loc>https://joren.blog/categories/network/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/networking/</loc>
|
<loc>https://joren.blog/categories/networking/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/offensive/</loc>
|
<loc>https://joren.blog/categories/offensive/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/</loc>
|
<loc>https://joren.blog/blog/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/project/</loc>
|
<loc>https://joren.blog/project/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/reverse-engineering/</loc>
|
<loc>https://joren.blog/categories/reverse-engineering/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/seiko/</loc>
|
<loc>https://joren.blog/categories/seiko/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-9/</loc>
|
<loc>https://joren.blog/blog/post-9/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/self-hosting/</loc>
|
<loc>https://joren.blog/categories/self-hosting/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-5/</loc>
|
<loc>https://joren.blog/blog/post-5/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-10/</loc>
|
<loc>https://joren.blog/blog/post-10/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/vpn/</loc>
|
<loc>https://joren.blog/categories/vpn/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/watches/</loc>
|
<loc>https://joren.blog/categories/watches/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/windows/</loc>
|
<loc>https://joren.blog/categories/windows/</loc>
|
||||||
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/project/project-2/</loc>
|
<loc>https://joren.blog/project/project-2/</loc>
|
||||||
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/project/project-1/</loc>
|
<loc>https://joren.blog/project/project-1/</loc>
|
||||||
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/interview/</loc>
|
<loc>https://joren.blog/categories/interview/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/podcast/</loc>
|
<loc>https://joren.blog/categories/podcast/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-4/</loc>
|
<loc>https://joren.blog/blog/post-4/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-1/</loc>
|
<loc>https://joren.blog/blog/post-1/</loc>
|
||||||
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/event/</loc>
|
<loc>https://joren.blog/categories/event/</loc>
|
||||||
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/ctf/</loc>
|
<loc>https://joren.blog/categories/ctf/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/education/</loc>
|
<loc>https://joren.blog/categories/education/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-2/</loc>
|
<loc>https://joren.blog/blog/post-2/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/categories/defense/</loc>
|
<loc>https://joren.blog/categories/defense/</loc>
|
||||||
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/blog/post-3/</loc>
|
<loc>https://joren.blog/blog/post-3/</loc>
|
||||||
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>http://localhost:1313/tags/</loc>
|
<loc>https://joren.blog/tags/</loc>
|
||||||
</url>
|
</url>
|
||||||
</urlset>
|
</urlset>
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
|
|
||||||
<script src="/livereload.js?mindelay=10&v=2&port=1313&path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>
|
<script>window.location.replace("\/");</script>
|
||||||
|
@ -2,10 +2,10 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Tags on Joren's Site</title>
|
<title>Tags on Joren's Site</title>
|
||||||
<link>http://localhost:1313/tags/</link>
|
<link>https://joren.blog/tags/</link>
|
||||||
<description>Recent content in Tags on Joren's Site</description>
|
<description>Recent content in Tags on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<atom:link href="http://localhost:1313/tags/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="https://joren.blog/tags/index.xml" rel="self" type="application/rss+xml" />
|
||||||
</channel>
|
</channel>
|
||||||
</rss>
|
</rss>
|
||||||
|
@ -213,7 +213,7 @@
|
|||||||
<h4 class="card-title mb-2 h5 fw-medium">
|
<h4 class="card-title mb-2 h5 fw-medium">
|
||||||
{{ .title | markdownify }}
|
{{ .title | markdownify }}
|
||||||
</h4>
|
</h4>
|
||||||
{{ with .company }}
|
{{ with .institution }}
|
||||||
<p class="d-inline-block me-2">
|
<p class="d-inline-block me-2">
|
||||||
{{ . | markdownify }}
|
{{ . | markdownify }}
|
||||||
</p>
|
</p>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user