h
This commit is contained in:
parent
b56840f40a
commit
86379147ab
Binary file not shown.
Before Width: | Height: | Size: 107 KiB After Width: | Height: | Size: 462 KiB |
Binary file not shown.
Before Width: | Height: | Size: 114 KiB After Width: | Height: | Size: 110 KiB |
Binary file not shown.
Before Width: | Height: | Size: 2.1 MiB After Width: | Height: | Size: 155 KiB |
@ -7,8 +7,6 @@ categories: ["cybersecurity", "event"]
|
|||||||
draft: false
|
draft: false
|
||||||
---
|
---
|
||||||
|
|
||||||
# Cyber Defence on the Digital Frontline: A Mission with NATO
|
|
||||||
|
|
||||||
#### On a Mission with NATO: Cyber Defence on the Frontline
|
#### On a Mission with NATO: Cyber Defence on the Frontline
|
||||||
|
|
||||||
Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO's most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.
|
Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO's most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.
|
||||||
@ -43,7 +41,7 @@ The biggest lesson? You are never fully prepared. Every iteration of Locked Shie
|
|||||||
|
|
||||||
#### From the Battlefield to the Classroom
|
#### From the Battlefield to the Classroom
|
||||||
|
|
||||||
This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses like “Glutamine” in semester five. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
|
This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
|
||||||
|
|
||||||
As one speaker said: “You don’t win Locked Shields. You just survive it better than the rest.”
|
As one speaker said: “You don’t win Locked Shields. You just survive it better than the rest.”
|
||||||
|
|
||||||
|
@ -7,11 +7,9 @@ categories: ["cybersecurity", "CTF", "education"]
|
|||||||
draft: false
|
draft: false
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience
|
|
||||||
|
|
||||||
On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.
|
On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.
|
||||||
|
|
||||||
What follows is a recap of the challenges I personally worked on, some I solved, some I didn’t—but all of them left me with new skills and new ideas.
|
What follows is a recap of the challenges I personally worked on, some I solved, some I didn’t, but all of them left me with new skills and new ideas.
|
||||||
|
|
||||||
#### A Buffer Overflow to Warm Up
|
#### A Buffer Overflow to Warm Up
|
||||||
|
|
||||||
@ -53,7 +51,7 @@ Class loadClass = new InMemoryDexClassLoader(ByteBuffer.wrap(byteArrayOutputStre
|
|||||||
.loadClass("be.dauntless.flag.Flag");
|
.loadClass("be.dauntless.flag.Flag");
|
||||||
````
|
````
|
||||||
|
|
||||||
Each `block` was a fragment of a DEX file, but the app didn’t tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsets—to infer how to reassemble the full file. I got close, but didn’t crack it in time.
|
Each `block` was a fragment of a DEX file, but the app didn’t tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsets, to infer how to reassemble the full file. I got close, but didn’t crack it in time.
|
||||||
|
|
||||||
That challenge stuck with me because it combined static analysis, runtime introspection, and logic reconstruction. It wasn’t just technical, it was creative.
|
That challenge stuck with me because it combined static analysis, runtime introspection, and logic reconstruction. It wasn’t just technical, it was creative.
|
||||||
|
|
||||||
|
@ -7,21 +7,19 @@ categories: ["cybersecurity", "event", "defense"]
|
|||||||
draft: false
|
draft: false
|
||||||
---
|
---
|
||||||
|
|
||||||
# Securing Cyberspace: Belgian Cyber Command at Howest
|
|
||||||
|
|
||||||
On November 12, we had the opportunity to attend a Tech&Meet session unlike any other. The speaker was **Colonel Gunther Godefridis**, Director for Development & Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.
|
On November 12, we had the opportunity to attend a Tech&Meet session unlike any other. The speaker was **Colonel Gunther Godefridis**, Director for Development & Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.
|
||||||
|
|
||||||
Held at Howest Campus Brugge Station, the event drew students, researchers, and professionals eager to understand how military-grade cybersecurity operations are run, and why they matter more than ever.
|
Held at Howest Campus Brugge Station, the event drew students, researchers, and professionals eager to understand how military-grade cybersecurity operations are run, and why they matter more than ever.
|
||||||
|
|
||||||
#### Defending in the Digital Age
|
#### Defending in the Digital Age
|
||||||
|
|
||||||
Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defense’s networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isn’t just watching traffic, it’s **actively shaping Belgium’s digital resilience**.
|
Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defense’s networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isn’t just watching traffic, it’s actively shaping Belgium’s digital resilience.
|
||||||
|
|
||||||
With society’s increasing reliance on digital infrastructure, the risks of **espionage, disinformation, and attacks on critical systems** are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
|
With society’s increasing reliance on digital infrastructure, the risks of espionage, disinformation, and attacks on critical systems are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
|
||||||
|
|
||||||
#### Working Together: Academia, Industry, Government
|
#### Working Together: Academia, Industry, Government
|
||||||
|
|
||||||
One theme that stood out was **collaboration**. Cyber Command doesn’t operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that **defending cyberspace requires broad cooperation**, and Belgium’s approach is to engage across domains, military, civil, and industrial.
|
One theme that stood out was collaboration. Cyber Command doesn’t operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that defending cyberspace requires broad cooperation, and Belgium’s approach is to engage across domains, military, civil, and industrial.
|
||||||
|
|
||||||
He also made it clear that this isn’t just about defense systems or classified data. As the line between civil and military digital infrastructure blurs, vulnerabilities in civilian systems can become national security issues. That’s where cooperation becomes essential.
|
He also made it clear that this isn’t just about defense systems or classified data. As the line between civil and military digital infrastructure blurs, vulnerabilities in civilian systems can become national security issues. That’s where cooperation becomes essential.
|
||||||
|
|
||||||
@ -29,7 +27,7 @@ He also made it clear that this isn’t just about defense systems or classified
|
|||||||
|
|
||||||
With over 20 years in military service, Colonel Godefridis brings a unique perspective. From artillery innovation to defense technology strategy, and now to cyber development, his background reflects the evolving nature of conflict and the military's response.
|
With over 20 years in military service, Colonel Godefridis brings a unique perspective. From artillery innovation to defense technology strategy, and now to cyber development, his background reflects the evolving nature of conflict and the military's response.
|
||||||
|
|
||||||
He discussed how **innovation, including artificial intelligence, is becoming central to cyber defense**. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. It’s not just about building walls, it’s about **staying several moves ahead**.
|
He discussed how innovation, including artificial intelligence, is becoming central to cyber defense. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. It’s not just about building walls, it’s about **staying several moves ahead**.
|
||||||
|
|
||||||
#### A Transparent, Human Conversation
|
#### A Transparent, Human Conversation
|
||||||
|
|
||||||
@ -39,7 +37,7 @@ Colonel Godefridis was honest about the challenges. Cyber operations evolve quic
|
|||||||
|
|
||||||
#### Final Thoughts
|
#### Final Thoughts
|
||||||
|
|
||||||
If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into **how Belgium is preparing for cyber conflict**, and how students like us could be a part of that mission.
|
If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into how Belgium is preparing for cyber conflict, and how students like us could be a part of that mission.
|
||||||
|
|
||||||
Whether you’re in cybersecurity, software development, or systems engineering, there’s a growing role to play. And as Colonel Godefridis made clear: it’s not just a job. It’s part of defending a society that’s more vulnerable, and more connected, than ever before.
|
Whether you’re in cybersecurity, software development, or systems engineering, there’s a growing role to play. And as Colonel Godefridis made clear: it’s not just a job. It’s part of defending a society that’s more vulnerable, and more connected, than ever before.
|
||||||
|
|
||||||
|
@ -7,9 +7,7 @@ categories: ["cybersecurity", "podcast", "interview"]
|
|||||||
draft: false
|
draft: false
|
||||||
---
|
---
|
||||||
|
|
||||||
# Red Team Talk: Een Blik Achter de Schermen bij Offensive Security
|
In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
|
||||||
|
|
||||||
In deze eerste aflevering van **Red Team Talk** nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
|
|
||||||
|
|
||||||
#### Van Interesse tot Loopbaan
|
#### Van Interesse tot Loopbaan
|
||||||
|
|
||||||
@ -17,7 +15,7 @@ Thomas deelt hoe zijn interesse in cybersecurity begon tijdens zijn opleiding, m
|
|||||||
|
|
||||||
#### Offensive vs. Defensive Security
|
#### Offensive vs. Defensive Security
|
||||||
|
|
||||||
Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het **red team werk zijn voorkeur** behouden.
|
Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het red team werk zijn voorkeur behouden.
|
||||||
|
|
||||||
#### Wat doet een pentester nu echt?
|
#### Wat doet een pentester nu echt?
|
||||||
|
|
||||||
@ -27,12 +25,12 @@ Thomas legt uit hoe een typische pentest verloopt: van het ontvangen van de scop
|
|||||||
|
|
||||||
Een groot deel van zijn werk focust op **Active Directory (AD)**, waar hij telkens weer dezelfde pijnpunten tegenkomt: legacy-instellingen, onvoldoende gepatchte systemen, en misconfiguraties die vaak pas worden rechtgezet na een echte aanval. Twee voorbeelden die hij aanhaalt:
|
Een groot deel van zijn werk focust op **Active Directory (AD)**, waar hij telkens weer dezelfde pijnpunten tegenkomt: legacy-instellingen, onvoldoende gepatchte systemen, en misconfiguraties die vaak pas worden rechtgezet na een echte aanval. Twee voorbeelden die hij aanhaalt:
|
||||||
|
|
||||||
- **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
|
* **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
|
||||||
- **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
|
* **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
|
||||||
|
|
||||||
#### Tools, Tips en Oefenen
|
#### Tools, Tips en Oefenen
|
||||||
|
|
||||||
Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door **zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen**.
|
Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen.
|
||||||
|
|
||||||
#### De Praktijk vs. Certificaten
|
#### De Praktijk vs. Certificaten
|
||||||
|
|
||||||
|
@ -4,16 +4,17 @@
|
|||||||
"a",
|
"a",
|
||||||
"article",
|
"article",
|
||||||
"aside",
|
"aside",
|
||||||
"base",
|
|
||||||
"body",
|
"body",
|
||||||
"br",
|
"br",
|
||||||
"button",
|
"button",
|
||||||
"code",
|
"code",
|
||||||
"div",
|
"div",
|
||||||
|
"em",
|
||||||
"figcaption",
|
"figcaption",
|
||||||
"figure",
|
"figure",
|
||||||
"footer",
|
"footer",
|
||||||
"form",
|
"form",
|
||||||
|
"g",
|
||||||
"h1",
|
"h1",
|
||||||
"h2",
|
"h2",
|
||||||
"h3",
|
"h3",
|
||||||
@ -31,10 +32,12 @@
|
|||||||
"main",
|
"main",
|
||||||
"meta",
|
"meta",
|
||||||
"nav",
|
"nav",
|
||||||
|
"notice",
|
||||||
"ol",
|
"ol",
|
||||||
"p",
|
"p",
|
||||||
"path",
|
"path",
|
||||||
"picture",
|
"picture",
|
||||||
|
"polygon",
|
||||||
"pre",
|
"pre",
|
||||||
"script",
|
"script",
|
||||||
"section",
|
"section",
|
||||||
@ -46,7 +49,10 @@
|
|||||||
"table",
|
"table",
|
||||||
"tbody",
|
"tbody",
|
||||||
"td",
|
"td",
|
||||||
|
"text",
|
||||||
"textarea",
|
"textarea",
|
||||||
|
"th",
|
||||||
|
"thead",
|
||||||
"title",
|
"title",
|
||||||
"tr",
|
"tr",
|
||||||
"ul"
|
"ul"
|
||||||
@ -141,6 +147,7 @@
|
|||||||
"gap-3",
|
"gap-3",
|
||||||
"gap-4",
|
"gap-4",
|
||||||
"gap-5",
|
"gap-5",
|
||||||
|
"goat",
|
||||||
"gx-md-5",
|
"gx-md-5",
|
||||||
"gx-xxl-5",
|
"gx-xxl-5",
|
||||||
"gy-4",
|
"gy-4",
|
||||||
@ -237,6 +244,7 @@
|
|||||||
"section-title",
|
"section-title",
|
||||||
"small",
|
"small",
|
||||||
"social-links",
|
"social-links",
|
||||||
|
"svg-container",
|
||||||
"text-capitalize",
|
"text-capitalize",
|
||||||
"text-center",
|
"text-center",
|
||||||
"text-lg-center",
|
"text-lg-center",
|
||||||
@ -257,21 +265,30 @@
|
|||||||
"android-reversing-frida-and-jadx",
|
"android-reversing-frida-and-jadx",
|
||||||
"architecture-overview",
|
"architecture-overview",
|
||||||
"banner",
|
"banner",
|
||||||
|
"base-setup",
|
||||||
"blog",
|
"blog",
|
||||||
|
"but-it-encrypts-traffic",
|
||||||
"caption-Binary Exploitation Flag",
|
"caption-Binary Exploitation Flag",
|
||||||
"caption-Challange picture",
|
"caption-Challange picture",
|
||||||
"caption-Correct number order",
|
"caption-Correct number order",
|
||||||
"caption-Picture of the solution",
|
"caption-Picture of the solution",
|
||||||
|
"capturing-vs-relaying",
|
||||||
|
"caveats--limitations",
|
||||||
|
"cheap-camera-expensive-risk-hacking-an-iot-ptz-camera",
|
||||||
"contact",
|
"contact",
|
||||||
"creating-the-hugo-site",
|
"creating-the-hugo-site",
|
||||||
"customization",
|
"customization",
|
||||||
"cyber-defence-on-the-digital-frontline-a-mission-with-nato",
|
"cyber-defence-on-the-digital-frontline-a-mission-with-nato",
|
||||||
"de-praktijk-vs-certificaten",
|
"de-praktijk-vs-certificaten",
|
||||||
"defending-in-the-digital-age",
|
"defending-in-the-digital-age",
|
||||||
|
"delegation-more-trust-more-problems",
|
||||||
|
"design--build-quality",
|
||||||
|
"dns-and-ad-blocking-blocky",
|
||||||
"drmdtool",
|
"drmdtool",
|
||||||
"email",
|
"email",
|
||||||
"enhanced-download-logic",
|
"enhanced-download-logic",
|
||||||
"example-drmd-structure",
|
"example-drmd-structure",
|
||||||
|
"federation-and-interoperability",
|
||||||
"final-thoughts",
|
"final-thoughts",
|
||||||
"firstName",
|
"firstName",
|
||||||
"from-the-battlefield-to-the-classroom",
|
"from-the-battlefield-to-the-classroom",
|
||||||
@ -279,12 +296,26 @@
|
|||||||
"high-stakes-real-lessons",
|
"high-stakes-real-lessons",
|
||||||
"highlights-and-blooper-reel",
|
"highlights-and-blooper-reel",
|
||||||
"how-drmd-files-work",
|
"how-drmd-files-work",
|
||||||
|
"how-kerberos-actually-works",
|
||||||
"human-factors-and-growth",
|
"human-factors-and-growth",
|
||||||
"infinite-luck-one-in-a-million",
|
"infinite-luck-one-in-a-million",
|
||||||
|
"ipv6-enabled-by-default-forgotten-by-admins",
|
||||||
|
"irc-ngircd",
|
||||||
|
"kerberoasting-plaintext-passwords-in-disguise",
|
||||||
|
"kerberos-under-siege-abusing-the-trust-backbone-of-windows-domains",
|
||||||
"kwetsbaarheden-in-active-directory",
|
"kwetsbaarheden-in-active-directory",
|
||||||
"lastName",
|
"lastName",
|
||||||
"leading-with-innovation",
|
"leading-with-innovation",
|
||||||
|
"lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux",
|
||||||
|
"let-me-know-if-youd-like-to-plug-this-directly-into-the-markdown-file-or-add-screenshotsterminal-views",
|
||||||
|
"limitations-and-workarounds",
|
||||||
|
"making-it-stick-lbu",
|
||||||
|
"matrix-building-a-decentralized-communication-future",
|
||||||
|
"matrix-in-cybersecurity-contexts",
|
||||||
"message",
|
"message",
|
||||||
|
"mitigation",
|
||||||
|
"movement--performance",
|
||||||
|
"name-resolution-chaos",
|
||||||
"navbar",
|
"navbar",
|
||||||
"offensive-vs-defensive-security",
|
"offensive-vs-defensive-security",
|
||||||
"on-a-mission-with-nato-cyber-defence-on-the-frontline",
|
"on-a-mission-with-nato-cyber-defence-on-the-frontline",
|
||||||
@ -292,25 +323,49 @@
|
|||||||
"phone",
|
"phone",
|
||||||
"portfolio",
|
"portfolio",
|
||||||
"processing-steps",
|
"processing-steps",
|
||||||
|
"real-world-examples",
|
||||||
|
"real-world-usage",
|
||||||
|
"realistic-attack-chain",
|
||||||
"red-team-talk-een-blik-achter-de-schermen-bij-offensive-security",
|
"red-team-talk-een-blik-achter-de-schermen-bij-offensive-security",
|
||||||
"repository",
|
"repository",
|
||||||
"resume",
|
"resume",
|
||||||
"reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience",
|
"reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience",
|
||||||
|
"runlevel-integration",
|
||||||
|
"running-your-own-homeserver",
|
||||||
|
"sample-home-setup",
|
||||||
"securing-cyberspace-belgian-cyber-command-at-howest",
|
"securing-cyberspace-belgian-cyber-command-at-howest",
|
||||||
|
"security-end-to-end-encryption-by-default",
|
||||||
|
"seiko-sarv001-the-jdm-sleeper-that-punches-above-its-weight",
|
||||||
"sidebarContent",
|
"sidebarContent",
|
||||||
|
"silent-interception-exploiting-llmnr-nbt-ns-mdns-and-ipv6-in-modern-networks",
|
||||||
"skill",
|
"skill",
|
||||||
"the-black-team-rapid-response-in-action",
|
"the-black-team-rapid-response-in-action",
|
||||||
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
|
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
|
||||||
|
"the-developer-angle",
|
||||||
"the-exercise-locked-shields",
|
"the-exercise-locked-shields",
|
||||||
"the-one-that-got-away-tls-fingerprinting",
|
"the-one-that-got-away-tls-fingerprinting",
|
||||||
|
"the-smart-home-trap-isolate-or-be-owned",
|
||||||
|
"ticket-forgery-and-impersonation",
|
||||||
"toggler",
|
"toggler",
|
||||||
"tools-tips-en-oefenen",
|
"tools-tips-en-oefenen",
|
||||||
|
"triggering-debug-mode-with-a-microsd-card",
|
||||||
|
"uart-interface-disabled-login-but-still-there",
|
||||||
|
"value-proposition",
|
||||||
"van-interesse-tot-loopbaan",
|
"van-interesse-tot-loopbaan",
|
||||||
|
"vlans-101",
|
||||||
|
"vpn-wireguard-via-pivpn",
|
||||||
"vps-deployment",
|
"vps-deployment",
|
||||||
"wat-doet-een-pentester-nu-echt",
|
"wat-doet-een-pentester-nu-echt",
|
||||||
|
"wearability--versatility",
|
||||||
"web-ui--cli",
|
"web-ui--cli",
|
||||||
|
"what-can-be-done",
|
||||||
|
"what-could-go-wrong",
|
||||||
|
"what-is-matrix",
|
||||||
"whats-new",
|
"whats-new",
|
||||||
"why-alpine--hugo",
|
"why-alpine--hugo",
|
||||||
|
"why-diskless",
|
||||||
|
"why-segmentation-matters",
|
||||||
|
"worked-example-kerberoasting-with-rubeus",
|
||||||
"working-together-academia-industry-government"
|
"working-together-academia-industry-government"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,39 +2,81 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Recent Posts on Joren's Site</title>
|
<title>Recent Posts on Joren's Site</title>
|
||||||
<link>https://joren.blog/blog/</link>
|
<link>http://localhost:1313/blog/</link>
|
||||||
<description>Recent content in Recent Posts on Joren's Site</description>
|
<description>Recent content in Recent Posts on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/blog/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/blog/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><h1 id="the-smart-home-trap-isolate-or-be-owned">The Smart Home Trap: Isolate or Be Owned</h1>
<p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>https://joren.blog/blog/post-4/</link>
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-4/</guid>
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>https://joren.blog/blog/post-1/</link>
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-1/</guid>
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
<description><h1 id="cyber-defence-on-the-digital-frontline-a-mission-with-nato">Cyber Defence on the Digital Frontline: A Mission with NATO</h1>
<h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>https://joren.blog/blog/post-2/</link>
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-2/</guid>
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>https://joren.blog/blog/post-3/</link>
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-3/</guid>
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
</rss>
|
</rss>
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>CTF on Joren's Site</title>
|
<title>CTF on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/ctf/</link>
|
<link>http://localhost:1313/categories/ctf/</link>
|
||||||
<description>Recent content in CTF on Joren's Site</description>
|
<description>Recent content in CTF on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>https://joren.blog/blog/post-2/</link>
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-2/</guid>
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,39 +2,67 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Cybersecurity on Joren's Site</title>
|
<title>Cybersecurity on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/cybersecurity/</link>
|
<link>http://localhost:1313/categories/cybersecurity/</link>
|
||||||
<description>Recent content in Cybersecurity on Joren's Site</description>
|
<description>Recent content in Cybersecurity on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><h1 id="the-smart-home-trap-isolate-or-be-owned">The Smart Home Trap: Isolate or Be Owned</h1>
<p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>https://joren.blog/blog/post-4/</link>
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-4/</guid>
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>https://joren.blog/blog/post-1/</link>
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-1/</guid>
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
<description><h1 id="cyber-defence-on-the-digital-frontline-a-mission-with-nato">Cyber Defence on the Digital Frontline: A Mission with NATO</h1>
<h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>https://joren.blog/blog/post-2/</link>
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-2/</guid>
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>https://joren.blog/blog/post-3/</link>
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-3/</guid>
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
</rss>
|
</rss>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Defense on Joren's Site</title>
|
<title>Defense on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/defense/</link>
|
<link>http://localhost:1313/categories/defense/</link>
|
||||||
<description>Recent content in Defense on Joren's Site</description>
|
<description>Recent content in Defense on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/defense/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/defense/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>https://joren.blog/blog/post-3/</link>
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-3/</guid>
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Education on Joren's Site</title>
|
<title>Education on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/education/</link>
|
<link>http://localhost:1313/categories/education/</link>
|
||||||
<description>Recent content in Education on Joren's Site</description>
|
<description>Recent content in Education on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/education/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/education/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>https://joren.blog/blog/post-2/</link>
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-2/</guid>
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,24 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Event on Joren's Site</title>
|
<title>Event on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/event/</link>
|
<link>http://localhost:1313/categories/event/</link>
|
||||||
<description>Recent content in Event on Joren's Site</description>
|
<description>Recent content in Event on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/event/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/event/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>https://joren.blog/blog/post-1/</link>
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-1/</guid>
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
<description><h1 id="cyber-defence-on-the-digital-frontline-a-mission-with-nato">Cyber Defence on the Digital Frontline: A Mission with NATO</h1>
<h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h1 id="cyber-defence-on-the-digital-frontline-a-mission-with-nato">Cyber Defence on the Digital Frontline: A Mission with NATO</h1>
<h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>https://joren.blog/blog/post-3/</link>
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-3/</guid>
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
|
|
||||||
<script>window.location.replace("\/");</script>
|
<script src="/livereload.js?mindelay=10&v=2&port=1313&path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>
|
||||||
|
@ -2,59 +2,73 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Categories on Joren's Site</title>
|
<title>Categories on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/</link>
|
<link>http://localhost:1313/categories/</link>
|
||||||
<description>Recent content in Categories on Joren's Site</description>
|
<description>Recent content in Categories on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Cybersecurity</title>
|
<title>Cybersecurity</title>
|
||||||
<link>https://joren.blog/categories/cybersecurity/</link>
|
<link>http://localhost:1313/categories/cybersecurity/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/cybersecurity/</guid>
|
<guid>http://localhost:1313/categories/cybersecurity/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Network</title>
|
||||||
|
<link>http://localhost:1313/categories/network/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/network/</guid>
|
||||||
|
<description></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Offensive</title>
|
||||||
|
<link>http://localhost:1313/categories/offensive/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/categories/offensive/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Interview</title>
|
<title>Interview</title>
|
||||||
<link>https://joren.blog/categories/interview/</link>
|
<link>http://localhost:1313/categories/interview/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/interview/</guid>
|
<guid>http://localhost:1313/categories/interview/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Podcast</title>
|
<title>Podcast</title>
|
||||||
<link>https://joren.blog/categories/podcast/</link>
|
<link>http://localhost:1313/categories/podcast/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/podcast/</guid>
|
<guid>http://localhost:1313/categories/podcast/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Event</title>
|
<title>Event</title>
|
||||||
<link>https://joren.blog/categories/event/</link>
|
<link>http://localhost:1313/categories/event/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/event/</guid>
|
<guid>http://localhost:1313/categories/event/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>CTF</title>
|
<title>CTF</title>
|
||||||
<link>https://joren.blog/categories/ctf/</link>
|
<link>http://localhost:1313/categories/ctf/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/ctf/</guid>
|
<guid>http://localhost:1313/categories/ctf/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Education</title>
|
<title>Education</title>
|
||||||
<link>https://joren.blog/categories/education/</link>
|
<link>http://localhost:1313/categories/education/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/education/</guid>
|
<guid>http://localhost:1313/categories/education/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Defense</title>
|
<title>Defense</title>
|
||||||
<link>https://joren.blog/categories/defense/</link>
|
<link>http://localhost:1313/categories/defense/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/categories/defense/</guid>
|
<guid>http://localhost:1313/categories/defense/</guid>
|
||||||
<description></description>
|
<description></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Interview on Joren's Site</title>
|
<title>Interview on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/interview/</link>
|
<link>http://localhost:1313/categories/interview/</link>
|
||||||
<description>Recent content in Interview on Joren's Site</description>
|
<description>Recent content in Interview on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/interview/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/interview/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>https://joren.blog/blog/post-4/</link>
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-4/</guid>
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,17 +2,17 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Podcast on Joren's Site</title>
|
<title>Podcast on Joren's Site</title>
|
||||||
<link>https://joren.blog/categories/podcast/</link>
|
<link>http://localhost:1313/categories/podcast/</link>
|
||||||
<description>Recent content in Podcast on Joren's Site</description>
|
<description>Recent content in Podcast on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>https://joren.blog/blog/post-4/</link>
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-4/</guid>
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
1053
public/index.html
1053
public/index.html
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,53 +2,102 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Home | Joren on Joren's Site</title>
|
<title>Home | Joren on Joren's Site</title>
|
||||||
<link>https://joren.blog/</link>
|
<link>http://localhost:1313/</link>
|
||||||
<description>Recent content in Home | Joren on Joren's Site</description>
|
<description>Recent content in Home | Joren on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Thu, 29 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
|
||||||
|
<link>http://localhost:1313/blog/post-8/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-8/</guid>
|
||||||
|
<description><p>When you pay €22.95 for a pan-tilt-zoom security camera, you’re not buying enterprise-grade security. But what if you’re also buying root access through an SD card?</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
|
||||||
|
<link>http://localhost:1313/blog/post-7/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-7/</guid>
|
||||||
|
<description><p>Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like <strong>Kerberoasting</strong>, <strong>delegation abuse</strong>, and <strong>ticket impersonation</strong>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Matrix: Building a Decentralized Communication Future</title>
|
||||||
|
<link>http://localhost:1313/blog/post-6/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-6/</guid>
|
||||||
|
<description><p>If you’ve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, you’ve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&rsquo;t trapped in walled gardens.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
|
||||||
|
<link>http://localhost:1313/blog/post-9/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-9/</guid>
|
||||||
|
<description><p>In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
|
||||||
|
<link>http://localhost:1313/blog/post-5/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-5/</guid>
|
||||||
|
<description><p>In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using <code>Responder</code> and <code>mitm6</code>.</p></description>
|
||||||
|
</item>
|
||||||
|
<item>
|
||||||
|
<title>The Smart Home Trap: Isolate or Be Owned</title>
|
||||||
|
<link>http://localhost:1313/blog/post-10/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/blog/post-10/</guid>
|
||||||
|
<description><h1 id="the-smart-home-trap-isolate-or-be-owned">The Smart Home Trap: Isolate or Be Owned</h1>
<p>Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.</p></description>
|
||||||
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Building My Hugo Website on a VPS</title>
|
<title>Building My Hugo Website on a VPS</title>
|
||||||
<link>https://joren.blog/project/project-2/</link>
|
<link>http://localhost:1313/project/project-2/</link>
|
||||||
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/project/project-2/</guid>
|
<guid>http://localhost:1313/project/project-2/</guid>
|
||||||
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>DRMDTool Project</title>
|
<title>DRMDTool Project</title>
|
||||||
<link>https://joren.blog/project/project-1/</link>
|
<link>http://localhost:1313/project/project-1/</link>
|
||||||
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/project/project-1/</guid>
|
<guid>http://localhost:1313/project/project-1/</guid>
|
||||||
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
|
||||||
<link>https://joren.blog/blog/post-4/</link>
|
<link>http://localhost:1313/blog/post-4/</link>
|
||||||
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-4/</guid>
|
<guid>http://localhost:1313/blog/post-4/</guid>
|
||||||
<description><h1 id="red-team-talk-een-blik-achter-de-schermen-bij-offensive-security">Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</h1>
<p>In deze eerste aflevering van <strong>Red Team Talk</strong> nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
<description><p>In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met <strong>Thomas Castronovo</strong>, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
|
||||||
<link>https://joren.blog/blog/post-1/</link>
|
<link>http://localhost:1313/blog/post-1/</link>
|
||||||
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-1/</guid>
|
<guid>http://localhost:1313/blog/post-1/</guid>
|
||||||
<description><h1 id="cyber-defence-on-the-digital-frontline-a-mission-with-nato">Cyber Defence on the Digital Frontline: A Mission with NATO</h1>
<h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
<description><h4 id="on-a-mission-with-nato-cyber-defence-on-the-frontline">On a Mission with NATO: Cyber Defence on the Frontline</h4>
<p>Howest’s ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
|
||||||
<link>https://joren.blog/blog/post-2/</link>
|
<link>http://localhost:1313/blog/post-2/</link>
|
||||||
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-2/</guid>
|
<guid>http://localhost:1313/blog/post-2/</guid>
|
||||||
<description><h1 id="reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience">Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</h1>
<p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
<description><p>On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
|
||||||
<link>https://joren.blog/blog/post-3/</link>
|
<link>http://localhost:1313/blog/post-3/</link>
|
||||||
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/blog/post-3/</guid>
|
<guid>http://localhost:1313/blog/post-3/</guid>
|
||||||
<description><h1 id="securing-cyberspace-belgian-cyber-command-at-howest">Securing Cyberspace: Belgian Cyber Command at Howest</h1>
<p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
<description><p>On November 12, we had the opportunity to attend a Tech&amp;Meet session unlike any other. The speaker was <strong>Colonel Gunther Godefridis</strong>, Director for Development &amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
</rss>
|
</rss>
|
||||||
|
@ -4,7 +4,7 @@
|
|||||||
"lang": "en",
|
"lang": "en",
|
||||||
"display": "fullscreen",
|
"display": "fullscreen",
|
||||||
"orientation" : "portrait",
|
"orientation" : "portrait",
|
||||||
"start_url": "https://joren.blog/?utm_source=web_app_manifest",
|
"start_url": "http://localhost:1313/?utm_source=web_app_manifest",
|
||||||
"background_color": "#0e1015",
|
"background_color": "#0e1015",
|
||||||
"theme_color": "#18b0a2",
|
"theme_color": "#18b0a2",
|
||||||
|
|
||||||
|
File diff suppressed because one or more lines are too long
@ -2,24 +2,31 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Recent Projects on Joren's Site</title>
|
<title>Recent Projects on Joren's Site</title>
|
||||||
<link>https://joren.blog/project/</link>
|
<link>http://localhost:1313/project/</link>
|
||||||
<description>Recent content in Recent Projects on Joren's Site</description>
|
<description>Recent content in Recent Projects on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<lastBuildDate>Thu, 29 May 2025 00:00:00 +0000</lastBuildDate>
|
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
|
||||||
<atom:link href="https://joren.blog/project/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/project/index.xml" rel="self" type="application/rss+xml" />
|
||||||
|
<item>
|
||||||
|
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking with Alpine Linux</title>
|
||||||
|
<link>http://localhost:1313/project/project-3/</link>
|
||||||
|
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
|
||||||
|
<guid>http://localhost:1313/project/project-3/</guid>
|
||||||
|
<description><h1 id="lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux">Lean and Local: DNS, VPN, IRC and Ad Blocking with Alpine Linux</h1>
<p>Running a full-featured network stack on old hardware isn’t just possible, it’s efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.</p></description>
|
||||||
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>Building My Hugo Website on a VPS</title>
|
<title>Building My Hugo Website on a VPS</title>
|
||||||
<link>https://joren.blog/project/project-2/</link>
|
<link>http://localhost:1313/project/project-2/</link>
|
||||||
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/project/project-2/</guid>
|
<guid>http://localhost:1313/project/project-2/</guid>
|
||||||
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
<description><p>I built my personal blog using <a href="https://gohugo.io/"




 target="_blank"
 


>Hugo</a> and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Here’s how the process went from site generation to live deployment.</p></description>
|
||||||
</item>
|
</item>
|
||||||
<item>
|
<item>
|
||||||
<title>DRMDTool Project</title>
|
<title>DRMDTool Project</title>
|
||||||
<link>https://joren.blog/project/project-1/</link>
|
<link>http://localhost:1313/project/project-1/</link>
|
||||||
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
|
||||||
<guid>https://joren.blog/project/project-1/</guid>
|
<guid>http://localhost:1313/project/project-1/</guid>
|
||||||
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
<description><p>DRMDTool is an automation-centric utility designed to streamline the processing of <code>.drmd</code> files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.</p></description>
|
||||||
</item>
|
</item>
|
||||||
</channel>
|
</channel>
|
||||||
|
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -2,57 +2,66 @@
|
|||||||
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
|
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
|
||||||
xmlns:xhtml="http://www.w3.org/1999/xhtml">
|
xmlns:xhtml="http://www.w3.org/1999/xhtml">
|
||||||
<url>
|
<url>
|
||||||
<loc>https://joren.blog/project/project-2/</loc>
|
<loc>http://localhost:1313/categories/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/categories/cybersecurity/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/categories/network/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/categories/offensive/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/blog/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/blog/post-5/</loc>
|
||||||
|
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
|
||||||
|
</url><url>
|
||||||
|
<loc>http://localhost:1313/project/project-2/</loc>
|
||||||
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/</loc>
|
<loc>http://localhost:1313/project/</loc>
|
||||||
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/project/</loc>
|
<loc>http://localhost:1313/project/project-1/</loc>
|
||||||
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
|
|
||||||
</url><url>
|
|
||||||
<loc>https://joren.blog/project/project-1/</loc>
|
|
||||||
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/</loc>
|
<loc>http://localhost:1313/categories/interview/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/cybersecurity/</loc>
|
<loc>http://localhost:1313/categories/podcast/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/interview/</loc>
|
<loc>http://localhost:1313/blog/post-4/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/podcast/</loc>
|
<loc>http://localhost:1313/blog/post-1/</loc>
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
|
||||||
</url><url>
|
|
||||||
<loc>https://joren.blog/blog/</loc>
|
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
|
||||||
</url><url>
|
|
||||||
<loc>https://joren.blog/blog/post-4/</loc>
|
|
||||||
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
|
|
||||||
</url><url>
|
|
||||||
<loc>https://joren.blog/blog/post-1/</loc>
|
|
||||||
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/event/</loc>
|
<loc>http://localhost:1313/categories/event/</loc>
|
||||||
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/ctf/</loc>
|
<loc>http://localhost:1313/categories/ctf/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/education/</loc>
|
<loc>http://localhost:1313/categories/education/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/blog/post-2/</loc>
|
<loc>http://localhost:1313/blog/post-2/</loc>
|
||||||
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/categories/defense/</loc>
|
<loc>http://localhost:1313/categories/defense/</loc>
|
||||||
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/blog/post-3/</loc>
|
<loc>http://localhost:1313/blog/post-3/</loc>
|
||||||
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
|
||||||
</url><url>
|
</url><url>
|
||||||
<loc>https://joren.blog/tags/</loc>
|
<loc>http://localhost:1313/tags/</loc>
|
||||||
</url>
|
</url>
|
||||||
</urlset>
|
</urlset>
|
||||||
|
@ -1,2 +1,2 @@
|
|||||||
|
|
||||||
<script>window.location.replace("\/");</script>
|
<script src="/livereload.js?mindelay=10&v=2&port=1313&path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>
|
||||||
|
@ -2,10 +2,10 @@
|
|||||||
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
|
||||||
<channel>
|
<channel>
|
||||||
<title>Tags on Joren's Site</title>
|
<title>Tags on Joren's Site</title>
|
||||||
<link>https://joren.blog/tags/</link>
|
<link>http://localhost:1313/tags/</link>
|
||||||
<description>Recent content in Tags on Joren's Site</description>
|
<description>Recent content in Tags on Joren's Site</description>
|
||||||
<generator>Hugo</generator>
|
<generator>Hugo</generator>
|
||||||
<language>en</language>
|
<language>en</language>
|
||||||
<atom:link href="https://joren.blog/tags/index.xml" rel="self" type="application/rss+xml" />
|
<atom:link href="http://localhost:1313/tags/index.xml" rel="self" type="application/rss+xml" />
|
||||||
</channel>
|
</channel>
|
||||||
</rss>
|
</rss>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user