diff --git a/assets/images/blog/blog-5.jpg b/assets/images/blog/blog-5.jpg
index 5da4a80..deb50a9 100644
Binary files a/assets/images/blog/blog-5.jpg and b/assets/images/blog/blog-5.jpg differ
diff --git a/assets/images/blog/blog-6.jpg b/assets/images/blog/blog-6.jpg
index 31b82ce..09d93b2 100644
Binary files a/assets/images/blog/blog-6.jpg and b/assets/images/blog/blog-6.jpg differ
diff --git a/assets/images/project/project-3.jpg b/assets/images/project/project-3.jpg
index 385ba31..84733de 100644
Binary files a/assets/images/project/project-3.jpg and b/assets/images/project/project-3.jpg differ
diff --git a/content/blog/post-1.md b/content/blog/post-1.md
index 9b7d9bd..d68bf29 100644
--- a/content/blog/post-1.md
+++ b/content/blog/post-1.md
@@ -7,8 +7,6 @@ categories: ["cybersecurity", "event"]
draft: false
---
-# Cyber Defence on the Digital Frontline: A Mission with NATO
-
#### On a Mission with NATO: Cyber Defence on the Frontline
Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO's most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.
@@ -43,7 +41,7 @@ The biggest lesson? You are never fully prepared. Every iteration of Locked Shie
#### From the Battlefield to the Classroom
-This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses like “Glutamine” in semester five. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
+This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
As one speaker said: “You don’t win Locked Shields. You just survive it better than the rest.”
diff --git a/content/blog/post-2.md b/content/blog/post-2.md
index 75e7578..c68affd 100644
--- a/content/blog/post-2.md
+++ b/content/blog/post-2.md
@@ -7,11 +7,9 @@ categories: ["cybersecurity", "CTF", "education"]
draft: false
---
-# Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience
-
On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.
-What follows is a recap of the challenges I personally worked on, some I solved, some I didn’t—but all of them left me with new skills and new ideas.
+What follows is a recap of the challenges I personally worked on, some I solved, some I didn’t, but all of them left me with new skills and new ideas.
#### A Buffer Overflow to Warm Up
@@ -53,7 +51,7 @@ Class loadClass = new InMemoryDexClassLoader(ByteBuffer.wrap(byteArrayOutputStre
.loadClass("be.dauntless.flag.Flag");
````
-Each `block` was a fragment of a DEX file, but the app didn’t tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsets—to infer how to reassemble the full file. I got close, but didn’t crack it in time.
+Each `block` was a fragment of a DEX file, but the app didn’t tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsets, to infer how to reassemble the full file. I got close, but didn’t crack it in time.
That challenge stuck with me because it combined static analysis, runtime introspection, and logic reconstruction. It wasn’t just technical, it was creative.
diff --git a/content/blog/post-3.md b/content/blog/post-3.md
index 9770938..8de4851 100644
--- a/content/blog/post-3.md
+++ b/content/blog/post-3.md
@@ -7,21 +7,19 @@ categories: ["cybersecurity", "event", "defense"]
draft: false
---
-# Securing Cyberspace: Belgian Cyber Command at Howest
-
On November 12, we had the opportunity to attend a Tech&Meet session unlike any other. The speaker was **Colonel Gunther Godefridis**, Director for Development & Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.
Held at Howest Campus Brugge Station, the event drew students, researchers, and professionals eager to understand how military-grade cybersecurity operations are run, and why they matter more than ever.
#### Defending in the Digital Age
-Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defense’s networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isn’t just watching traffic, it’s **actively shaping Belgium’s digital resilience**.
+Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defense’s networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isn’t just watching traffic, it’s actively shaping Belgium’s digital resilience.
-With society’s increasing reliance on digital infrastructure, the risks of **espionage, disinformation, and attacks on critical systems** are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
+With society’s increasing reliance on digital infrastructure, the risks of espionage, disinformation, and attacks on critical systems are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
#### Working Together: Academia, Industry, Government
-One theme that stood out was **collaboration**. Cyber Command doesn’t operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that **defending cyberspace requires broad cooperation**, and Belgium’s approach is to engage across domains, military, civil, and industrial.
+One theme that stood out was collaboration. Cyber Command doesn’t operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that defending cyberspace requires broad cooperation, and Belgium’s approach is to engage across domains, military, civil, and industrial.
He also made it clear that this isn’t just about defense systems or classified data. As the line between civil and military digital infrastructure blurs, vulnerabilities in civilian systems can become national security issues. That’s where cooperation becomes essential.
@@ -29,7 +27,7 @@ He also made it clear that this isn’t just about defense systems or classified
With over 20 years in military service, Colonel Godefridis brings a unique perspective. From artillery innovation to defense technology strategy, and now to cyber development, his background reflects the evolving nature of conflict and the military's response.
-He discussed how **innovation, including artificial intelligence, is becoming central to cyber defense**. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. It’s not just about building walls, it’s about **staying several moves ahead**.
+He discussed how innovation, including artificial intelligence, is becoming central to cyber defense. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. It’s not just about building walls, it’s about **staying several moves ahead**.
#### A Transparent, Human Conversation
@@ -39,7 +37,7 @@ Colonel Godefridis was honest about the challenges. Cyber operations evolve quic
#### Final Thoughts
-If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into **how Belgium is preparing for cyber conflict**, and how students like us could be a part of that mission.
+If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into how Belgium is preparing for cyber conflict, and how students like us could be a part of that mission.
Whether you’re in cybersecurity, software development, or systems engineering, there’s a growing role to play. And as Colonel Godefridis made clear: it’s not just a job. It’s part of defending a society that’s more vulnerable, and more connected, than ever before.
diff --git a/content/blog/post-4.md b/content/blog/post-4.md
index 5ec08e2..4b9c706 100644
--- a/content/blog/post-4.md
+++ b/content/blog/post-4.md
@@ -7,9 +7,7 @@ categories: ["cybersecurity", "podcast", "interview"]
draft: false
---
-# Red Team Talk: Een Blik Achter de Schermen bij Offensive Security
-
-In deze eerste aflevering van **Red Team Talk** nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
+In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
#### Van Interesse tot Loopbaan
@@ -17,7 +15,7 @@ Thomas deelt hoe zijn interesse in cybersecurity begon tijdens zijn opleiding, m
#### Offensive vs. Defensive Security
-Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het **red team werk zijn voorkeur** behouden.
+Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het red team werk zijn voorkeur behouden.
#### Wat doet een pentester nu echt?
@@ -27,12 +25,12 @@ Thomas legt uit hoe een typische pentest verloopt: van het ontvangen van de scop
Een groot deel van zijn werk focust op **Active Directory (AD)**, waar hij telkens weer dezelfde pijnpunten tegenkomt: legacy-instellingen, onvoldoende gepatchte systemen, en misconfiguraties die vaak pas worden rechtgezet na een echte aanval. Twee voorbeelden die hij aanhaalt:
-- **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
-- **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
+* **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
+* **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
#### Tools, Tips en Oefenen
-Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door **zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen**.
+Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen.
#### De Praktijk vs. Certificaten
diff --git a/hugo_stats.json b/hugo_stats.json
index c2fd8e0..dc27699 100644
--- a/hugo_stats.json
+++ b/hugo_stats.json
@@ -4,16 +4,17 @@
"a",
"article",
"aside",
- "base",
"body",
"br",
"button",
"code",
"div",
+ "em",
"figcaption",
"figure",
"footer",
"form",
+ "g",
"h1",
"h2",
"h3",
@@ -31,10 +32,12 @@
"main",
"meta",
"nav",
+ "notice",
"ol",
"p",
"path",
"picture",
+ "polygon",
"pre",
"script",
"section",
@@ -46,7 +49,10 @@
"table",
"tbody",
"td",
+ "text",
"textarea",
+ "th",
+ "thead",
"title",
"tr",
"ul"
@@ -141,6 +147,7 @@
"gap-3",
"gap-4",
"gap-5",
+ "goat",
"gx-md-5",
"gx-xxl-5",
"gy-4",
@@ -237,6 +244,7 @@
"section-title",
"small",
"social-links",
+ "svg-container",
"text-capitalize",
"text-center",
"text-lg-center",
@@ -257,21 +265,30 @@
"android-reversing-frida-and-jadx",
"architecture-overview",
"banner",
+ "base-setup",
"blog",
+ "but-it-encrypts-traffic",
"caption-Binary Exploitation Flag",
"caption-Challange picture",
"caption-Correct number order",
"caption-Picture of the solution",
+ "capturing-vs-relaying",
+ "caveats--limitations",
+ "cheap-camera-expensive-risk-hacking-an-iot-ptz-camera",
"contact",
"creating-the-hugo-site",
"customization",
"cyber-defence-on-the-digital-frontline-a-mission-with-nato",
"de-praktijk-vs-certificaten",
"defending-in-the-digital-age",
+ "delegation-more-trust-more-problems",
+ "design--build-quality",
+ "dns-and-ad-blocking-blocky",
"drmdtool",
"email",
"enhanced-download-logic",
"example-drmd-structure",
+ "federation-and-interoperability",
"final-thoughts",
"firstName",
"from-the-battlefield-to-the-classroom",
@@ -279,12 +296,26 @@
"high-stakes-real-lessons",
"highlights-and-blooper-reel",
"how-drmd-files-work",
+ "how-kerberos-actually-works",
"human-factors-and-growth",
"infinite-luck-one-in-a-million",
+ "ipv6-enabled-by-default-forgotten-by-admins",
+ "irc-ngircd",
+ "kerberoasting-plaintext-passwords-in-disguise",
+ "kerberos-under-siege-abusing-the-trust-backbone-of-windows-domains",
"kwetsbaarheden-in-active-directory",
"lastName",
"leading-with-innovation",
+ "lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux",
+ "let-me-know-if-youd-like-to-plug-this-directly-into-the-markdown-file-or-add-screenshotsterminal-views",
+ "limitations-and-workarounds",
+ "making-it-stick-lbu",
+ "matrix-building-a-decentralized-communication-future",
+ "matrix-in-cybersecurity-contexts",
"message",
+ "mitigation",
+ "movement--performance",
+ "name-resolution-chaos",
"navbar",
"offensive-vs-defensive-security",
"on-a-mission-with-nato-cyber-defence-on-the-frontline",
@@ -292,25 +323,49 @@
"phone",
"portfolio",
"processing-steps",
+ "real-world-examples",
+ "real-world-usage",
+ "realistic-attack-chain",
"red-team-talk-een-blik-achter-de-schermen-bij-offensive-security",
"repository",
"resume",
"reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience",
+ "runlevel-integration",
+ "running-your-own-homeserver",
+ "sample-home-setup",
"securing-cyberspace-belgian-cyber-command-at-howest",
+ "security-end-to-end-encryption-by-default",
+ "seiko-sarv001-the-jdm-sleeper-that-punches-above-its-weight",
"sidebarContent",
+ "silent-interception-exploiting-llmnr-nbt-ns-mdns-and-ipv6-in-modern-networks",
"skill",
"the-black-team-rapid-response-in-action",
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
+ "the-developer-angle",
"the-exercise-locked-shields",
"the-one-that-got-away-tls-fingerprinting",
+ "the-smart-home-trap-isolate-or-be-owned",
+ "ticket-forgery-and-impersonation",
"toggler",
"tools-tips-en-oefenen",
+ "triggering-debug-mode-with-a-microsd-card",
+ "uart-interface-disabled-login-but-still-there",
+ "value-proposition",
"van-interesse-tot-loopbaan",
+ "vlans-101",
+ "vpn-wireguard-via-pivpn",
"vps-deployment",
"wat-doet-een-pentester-nu-echt",
+ "wearability--versatility",
"web-ui--cli",
+ "what-can-be-done",
+ "what-could-go-wrong",
+ "what-is-matrix",
"whats-new",
"why-alpine--hugo",
+ "why-diskless",
+ "why-segmentation-matters",
+ "worked-example-kerberoasting-with-rubeus",
"working-together-academia-industry-government"
]
}
diff --git a/public/404.html b/public/404.html
index a05fa33..24abdea 100644
--- a/public/404.html
+++ b/public/404.html
@@ -1,7 +1,7 @@
-