This commit is contained in:
Joren 2025-05-30 21:43:15 +02:00
parent b56840f40a
commit 86379147ab
Signed by: Joren
GPG Key ID: 280E33DFBC0F1B55
42 changed files with 3113 additions and 548 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 107 KiB

After

Width:  |  Height:  |  Size: 462 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 114 KiB

After

Width:  |  Height:  |  Size: 110 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.1 MiB

After

Width:  |  Height:  |  Size: 155 KiB

View File

@ -7,8 +7,6 @@ categories: ["cybersecurity", "event"]
draft: false
---
# Cyber Defence on the Digital Frontline: A Mission with NATO
#### On a Mission with NATO: Cyber Defence on the Frontline
Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO's most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.
@ -43,7 +41,7 @@ The biggest lesson? You are never fully prepared. Every iteration of Locked Shie
#### From the Battlefield to the Classroom
This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses like “Glutamine” in semester five. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
This experience directly impacts the classroom. Inspired by the exercise, Howest is introducing new hands-on courses. Students will be dropped into realistic broken networks, with misconfigurations, fake firewalls and simulated threats. It is chaos, but controlled. And that is the point.
As one speaker said: “You dont win Locked Shields. You just survive it better than the rest.”

View File

@ -7,11 +7,9 @@ categories: ["cybersecurity", "CTF", "education"]
draft: false
---
# Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience
On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.
What follows is a recap of the challenges I personally worked on, some I solved, some I didntbut all of them left me with new skills and new ideas.
What follows is a recap of the challenges I personally worked on, some I solved, some I didnt, but all of them left me with new skills and new ideas.
#### A Buffer Overflow to Warm Up
@ -53,7 +51,7 @@ Class loadClass = new InMemoryDexClassLoader(ByteBuffer.wrap(byteArrayOutputStre
.loadClass("be.dauntless.flag.Flag");
````
Each `block` was a fragment of a DEX file, but the app didnt tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsetsto infer how to reassemble the full file. I got close, but didnt crack it in time.
Each `block` was a fragment of a DEX file, but the app didnt tell you the right order. I tried manually inspecting the fragments, identifying methods, string constants, and offsets, to infer how to reassemble the full file. I got close, but didnt crack it in time.
That challenge stuck with me because it combined static analysis, runtime introspection, and logic reconstruction. It wasnt just technical, it was creative.

View File

@ -7,21 +7,19 @@ categories: ["cybersecurity", "event", "defense"]
draft: false
---
# Securing Cyberspace: Belgian Cyber Command at Howest
On November 12, we had the opportunity to attend a Tech&Meet session unlike any other. The speaker was **Colonel Gunther Godefridis**, Director for Development & Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.
Held at Howest Campus Brugge Station, the event drew students, researchers, and professionals eager to understand how military-grade cybersecurity operations are run, and why they matter more than ever.
#### Defending in the Digital Age
Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defenses networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isnt just watching traffic, its **actively shaping Belgiums digital resilience**.
Colonel Godefridis began by outlining the **core mission of Belgian Cyber Command**: protecting Defenses networks and weapon systems, supporting intelligence operations (ADIV), and conducting defensive and offensive operations in cyberspace. In short, Cyber Command isnt just watching traffic, its actively shaping Belgiums digital resilience.
With societys increasing reliance on digital infrastructure, the risks of **espionage, disinformation, and attacks on critical systems** are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
With societys increasing reliance on digital infrastructure, the risks of espionage, disinformation, and attacks on critical systems are no longer theoretical. Godefridis highlighted the urgency of being able to respond to, not just detect, those threats.
#### Working Together: Academia, Industry, Government
One theme that stood out was **collaboration**. Cyber Command doesnt operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that **defending cyberspace requires broad cooperation**, and Belgiums approach is to engage across domains, military, civil, and industrial.
One theme that stood out was collaboration. Cyber Command doesnt operate in a vacuum. It works closely with national agencies, NATO partners, academic institutions, and the private sector. The colonel emphasized that defending cyberspace requires broad cooperation, and Belgiums approach is to engage across domains, military, civil, and industrial.
He also made it clear that this isnt just about defense systems or classified data. As the line between civil and military digital infrastructure blurs, vulnerabilities in civilian systems can become national security issues. Thats where cooperation becomes essential.
@ -29,7 +27,7 @@ He also made it clear that this isnt just about defense systems or classified
With over 20 years in military service, Colonel Godefridis brings a unique perspective. From artillery innovation to defense technology strategy, and now to cyber development, his background reflects the evolving nature of conflict and the military's response.
He discussed how **innovation, including artificial intelligence, is becoming central to cyber defense**. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. Its not just about building walls, its about **staying several moves ahead**.
He discussed how innovation, including artificial intelligence, is becoming central to cyber defense. Cyber Command is investing in tools and skills to automate threat detection, analyze large datasets, and simulate attack scenarios. Its not just about building walls, its about **staying several moves ahead**.
#### A Transparent, Human Conversation
@ -39,7 +37,7 @@ Colonel Godefridis was honest about the challenges. Cyber operations evolve quic
#### Final Thoughts
If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into **how Belgium is preparing for cyber conflict**, and how students like us could be a part of that mission.
If you walked into this talk expecting a dry presentation on military infrastructure, you were wrong. This session was a deep, realistic, and engaging look into how Belgium is preparing for cyber conflict, and how students like us could be a part of that mission.
Whether youre in cybersecurity, software development, or systems engineering, theres a growing role to play. And as Colonel Godefridis made clear: its not just a job. Its part of defending a society thats more vulnerable, and more connected, than ever before.

View File

@ -7,9 +7,7 @@ categories: ["cybersecurity", "podcast", "interview"]
draft: false
---
# Red Team Talk: Een Blik Achter de Schermen bij Offensive Security
In deze eerste aflevering van **Red Team Talk** nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met **Thomas Castronovo**, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.
#### Van Interesse tot Loopbaan
@ -17,7 +15,7 @@ Thomas deelt hoe zijn interesse in cybersecurity begon tijdens zijn opleiding, m
#### Offensive vs. Defensive Security
Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het **red team werk zijn voorkeur** behouden.
Hoewel zijn hart bij offensieve security ligt, kreeg hij recent ook ervaring aan de defensieve kant. Het leverde hem een breder perspectief op: “Het geeft een heel ander zicht op hoe aanvallen eruitzien vanuit de andere kant.” Toch blijft het red team werk zijn voorkeur behouden.
#### Wat doet een pentester nu echt?
@ -27,12 +25,12 @@ Thomas legt uit hoe een typische pentest verloopt: van het ontvangen van de scop
Een groot deel van zijn werk focust op **Active Directory (AD)**, waar hij telkens weer dezelfde pijnpunten tegenkomt: legacy-instellingen, onvoldoende gepatchte systemen, en misconfiguraties die vaak pas worden rechtgezet na een echte aanval. Twee voorbeelden die hij aanhaalt:
- **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
- **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
* **LLMNR/MDNS/NetBIOS poisoning** om credentials te verkrijgen
* **DNS wildcard records** die leiden tot man-in-the-middle aanvallen
#### Tools, Tips en Oefenen
Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door **zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen**.
Voor wie zelf wil beginnen raadt hij aan om zelf een AD op te zetten en tools als PingCastle en BloodHound uit te proberen. De meeste kennis verwerf je volgens Thomas door zelf te oefenen, dingen stuk te maken, en vooral: blijven proberen.
#### De Praktijk vs. Certificaten

View File

@ -4,16 +4,17 @@
"a",
"article",
"aside",
"base",
"body",
"br",
"button",
"code",
"div",
"em",
"figcaption",
"figure",
"footer",
"form",
"g",
"h1",
"h2",
"h3",
@ -31,10 +32,12 @@
"main",
"meta",
"nav",
"notice",
"ol",
"p",
"path",
"picture",
"polygon",
"pre",
"script",
"section",
@ -46,7 +49,10 @@
"table",
"tbody",
"td",
"text",
"textarea",
"th",
"thead",
"title",
"tr",
"ul"
@ -141,6 +147,7 @@
"gap-3",
"gap-4",
"gap-5",
"goat",
"gx-md-5",
"gx-xxl-5",
"gy-4",
@ -237,6 +244,7 @@
"section-title",
"small",
"social-links",
"svg-container",
"text-capitalize",
"text-center",
"text-lg-center",
@ -257,21 +265,30 @@
"android-reversing-frida-and-jadx",
"architecture-overview",
"banner",
"base-setup",
"blog",
"but-it-encrypts-traffic",
"caption-Binary Exploitation Flag",
"caption-Challange picture",
"caption-Correct number order",
"caption-Picture of the solution",
"capturing-vs-relaying",
"caveats--limitations",
"cheap-camera-expensive-risk-hacking-an-iot-ptz-camera",
"contact",
"creating-the-hugo-site",
"customization",
"cyber-defence-on-the-digital-frontline-a-mission-with-nato",
"de-praktijk-vs-certificaten",
"defending-in-the-digital-age",
"delegation-more-trust-more-problems",
"design--build-quality",
"dns-and-ad-blocking-blocky",
"drmdtool",
"email",
"enhanced-download-logic",
"example-drmd-structure",
"federation-and-interoperability",
"final-thoughts",
"firstName",
"from-the-battlefield-to-the-classroom",
@ -279,12 +296,26 @@
"high-stakes-real-lessons",
"highlights-and-blooper-reel",
"how-drmd-files-work",
"how-kerberos-actually-works",
"human-factors-and-growth",
"infinite-luck-one-in-a-million",
"ipv6-enabled-by-default-forgotten-by-admins",
"irc-ngircd",
"kerberoasting-plaintext-passwords-in-disguise",
"kerberos-under-siege-abusing-the-trust-backbone-of-windows-domains",
"kwetsbaarheden-in-active-directory",
"lastName",
"leading-with-innovation",
"lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux",
"let-me-know-if-youd-like-to-plug-this-directly-into-the-markdown-file-or-add-screenshotsterminal-views",
"limitations-and-workarounds",
"making-it-stick-lbu",
"matrix-building-a-decentralized-communication-future",
"matrix-in-cybersecurity-contexts",
"message",
"mitigation",
"movement--performance",
"name-resolution-chaos",
"navbar",
"offensive-vs-defensive-security",
"on-a-mission-with-nato-cyber-defence-on-the-frontline",
@ -292,25 +323,49 @@
"phone",
"portfolio",
"processing-steps",
"real-world-examples",
"real-world-usage",
"realistic-attack-chain",
"red-team-talk-een-blik-achter-de-schermen-bij-offensive-security",
"repository",
"resume",
"reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience",
"runlevel-integration",
"running-your-own-homeserver",
"sample-home-setup",
"securing-cyberspace-belgian-cyber-command-at-howest",
"security-end-to-end-encryption-by-default",
"seiko-sarv001-the-jdm-sleeper-that-punches-above-its-weight",
"sidebarContent",
"silent-interception-exploiting-llmnr-nbt-ns-mdns-and-ipv6-in-modern-networks",
"skill",
"the-black-team-rapid-response-in-action",
"the-challenge-that-stuck-with-me-rebuilding-a-split-dex",
"the-developer-angle",
"the-exercise-locked-shields",
"the-one-that-got-away-tls-fingerprinting",
"the-smart-home-trap-isolate-or-be-owned",
"ticket-forgery-and-impersonation",
"toggler",
"tools-tips-en-oefenen",
"triggering-debug-mode-with-a-microsd-card",
"uart-interface-disabled-login-but-still-there",
"value-proposition",
"van-interesse-tot-loopbaan",
"vlans-101",
"vpn-wireguard-via-pivpn",
"vps-deployment",
"wat-doet-een-pentester-nu-echt",
"wearability--versatility",
"web-ui--cli",
"what-can-be-done",
"what-could-go-wrong",
"what-is-matrix",
"whats-new",
"why-alpine--hugo",
"why-diskless",
"why-segmentation-matters",
"worked-example-kerberoasting-with-rubeus",
"working-together-academia-industry-government"
]
}

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -2,39 +2,81 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Recent Posts on Joren&#39;s Site</title>
<link>https://joren.blog/blog/</link>
<link>http://localhost:1313/blog/</link>
<description>Recent content in Recent Posts on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/blog/index.xml" rel="self" type="application/rss+xml" />
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/blog/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>http://localhost:1313/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>http://localhost:1313/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>http://localhost:1313/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>http://localhost:1313/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>http://localhost:1313/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-10/</guid>
<description>&lt;h1 id=&#34;the-smart-home-trap-isolate-or-be-owned&#34;&gt;The Smart Home Trap: Isolate or Be Owned&lt;/h1&gt;&#xA;&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;h1 id=&#34;red-team-talk-een-blik-achter-de-schermen-bij-offensive-security&#34;&gt;Red Team Talk: Een Blik Achter de Schermen bij Offensive Security&lt;/h1&gt;&#xA;&lt;p&gt;In deze eerste aflevering van &lt;strong&gt;Red Team Talk&lt;/strong&gt; nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h1 id=&#34;cyber-defence-on-the-digital-frontline-a-mission-with-nato&#34;&gt;Cyber Defence on the Digital Frontline: A Mission with NATO&lt;/h1&gt;&#xA;&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;h1 id=&#34;reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience&#34;&gt;Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience&lt;/h1&gt;&#xA;&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;h1 id=&#34;securing-cyberspace-belgian-cyber-command-at-howest&#34;&gt;Securing Cyberspace: Belgian Cyber Command at Howest&lt;/h1&gt;&#xA;&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -2,17 +2,17 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>CTF on Joren&#39;s Site</title>
<link>https://joren.blog/categories/ctf/</link>
<link>http://localhost:1313/categories/ctf/</link>
<description>Recent content in CTF on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/ctf/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;h1 id=&#34;reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience&#34;&gt;Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience&lt;/h1&gt;&#xA;&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

View File

@ -2,39 +2,67 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Cybersecurity on Joren&#39;s Site</title>
<link>https://joren.blog/categories/cybersecurity/</link>
<link>http://localhost:1313/categories/cybersecurity/</link>
<description>Recent content in Cybersecurity on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>http://localhost:1313/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>http://localhost:1313/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>http://localhost:1313/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-10/</guid>
<description>&lt;h1 id=&#34;the-smart-home-trap-isolate-or-be-owned&#34;&gt;The Smart Home Trap: Isolate or Be Owned&lt;/h1&gt;&#xA;&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;h1 id=&#34;red-team-talk-een-blik-achter-de-schermen-bij-offensive-security&#34;&gt;Red Team Talk: Een Blik Achter de Schermen bij Offensive Security&lt;/h1&gt;&#xA;&lt;p&gt;In deze eerste aflevering van &lt;strong&gt;Red Team Talk&lt;/strong&gt; nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h1 id=&#34;cyber-defence-on-the-digital-frontline-a-mission-with-nato&#34;&gt;Cyber Defence on the Digital Frontline: A Mission with NATO&lt;/h1&gt;&#xA;&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;h1 id=&#34;reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience&#34;&gt;Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience&lt;/h1&gt;&#xA;&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;h1 id=&#34;securing-cyberspace-belgian-cyber-command-at-howest&#34;&gt;Securing Cyberspace: Belgian Cyber Command at Howest&lt;/h1&gt;&#xA;&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

File diff suppressed because one or more lines are too long

View File

@ -2,17 +2,17 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Defense on Joren&#39;s Site</title>
<link>https://joren.blog/categories/defense/</link>
<link>http://localhost:1313/categories/defense/</link>
<description>Recent content in Defense on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 12 Nov 2024 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/defense/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/defense/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;h1 id=&#34;securing-cyberspace-belgian-cyber-command-at-howest&#34;&gt;Securing Cyberspace: Belgian Cyber Command at Howest&lt;/h1&gt;&#xA;&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

View File

@ -2,17 +2,17 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Education on Joren&#39;s Site</title>
<link>https://joren.blog/categories/education/</link>
<link>http://localhost:1313/categories/education/</link>
<description>Recent content in Education on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Sat, 15 Mar 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/education/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/education/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;h1 id=&#34;reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience&#34;&gt;Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience&lt;/h1&gt;&#xA;&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

View File

@ -2,24 +2,24 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Event on Joren&#39;s Site</title>
<link>https://joren.blog/categories/event/</link>
<link>http://localhost:1313/categories/event/</link>
<description>Recent content in Event on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 13 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/event/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/event/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h1 id=&#34;cyber-defence-on-the-digital-frontline-a-mission-with-nato&#34;&gt;Cyber Defence on the Digital Frontline: A Mission with NATO&lt;/h1&gt;&#xA;&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;h1 id=&#34;securing-cyberspace-belgian-cyber-command-at-howest&#34;&gt;Securing Cyberspace: Belgian Cyber Command at Howest&lt;/h1&gt;&#xA;&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>

View File

@ -1,2 +1,2 @@
<script>window.location.replace("\/");</script>
<script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>

View File

@ -2,59 +2,73 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Categories on Joren&#39;s Site</title>
<link>https://joren.blog/categories/</link>
<link>http://localhost:1313/categories/</link>
<description>Recent content in Categories on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/index.xml" rel="self" type="application/rss+xml" />
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/categories/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cybersecurity</title>
<link>https://joren.blog/categories/cybersecurity/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/cybersecurity/</guid>
<link>http://localhost:1313/categories/cybersecurity/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/categories/cybersecurity/</guid>
<description></description>
</item>
<item>
<title>Network</title>
<link>http://localhost:1313/categories/network/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/categories/network/</guid>
<description></description>
</item>
<item>
<title>Offensive</title>
<link>http://localhost:1313/categories/offensive/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/categories/offensive/</guid>
<description></description>
</item>
<item>
<title>Interview</title>
<link>https://joren.blog/categories/interview/</link>
<link>http://localhost:1313/categories/interview/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/interview/</guid>
<guid>http://localhost:1313/categories/interview/</guid>
<description></description>
</item>
<item>
<title>Podcast</title>
<link>https://joren.blog/categories/podcast/</link>
<link>http://localhost:1313/categories/podcast/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/podcast/</guid>
<guid>http://localhost:1313/categories/podcast/</guid>
<description></description>
</item>
<item>
<title>Event</title>
<link>https://joren.blog/categories/event/</link>
<link>http://localhost:1313/categories/event/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/event/</guid>
<guid>http://localhost:1313/categories/event/</guid>
<description></description>
</item>
<item>
<title>CTF</title>
<link>https://joren.blog/categories/ctf/</link>
<link>http://localhost:1313/categories/ctf/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/ctf/</guid>
<guid>http://localhost:1313/categories/ctf/</guid>
<description></description>
</item>
<item>
<title>Education</title>
<link>https://joren.blog/categories/education/</link>
<link>http://localhost:1313/categories/education/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/education/</guid>
<guid>http://localhost:1313/categories/education/</guid>
<description></description>
</item>
<item>
<title>Defense</title>
<link>https://joren.blog/categories/defense/</link>
<link>http://localhost:1313/categories/defense/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/categories/defense/</guid>
<guid>http://localhost:1313/categories/defense/</guid>
<description></description>
</item>
</channel>

File diff suppressed because one or more lines are too long

View File

@ -2,17 +2,17 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Interview on Joren&#39;s Site</title>
<link>https://joren.blog/categories/interview/</link>
<link>http://localhost:1313/categories/interview/</link>
<description>Recent content in Interview on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/interview/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/interview/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;h1 id=&#34;red-team-talk-een-blik-achter-de-schermen-bij-offensive-security&#34;&gt;Red Team Talk: Een Blik Achter de Schermen bij Offensive Security&lt;/h1&gt;&#xA;&lt;p&gt;In deze eerste aflevering van &lt;strong&gt;Red Team Talk&lt;/strong&gt; nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

View File

@ -2,17 +2,17 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Podcast on Joren&#39;s Site</title>
<link>https://joren.blog/categories/podcast/</link>
<link>http://localhost:1313/categories/podcast/</link>
<description>Recent content in Podcast on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Tue, 20 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/categories/podcast/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;h1 id=&#34;red-team-talk-een-blik-achter-de-schermen-bij-offensive-security&#34;&gt;Red Team Talk: Een Blik Achter de Schermen bij Offensive Security&lt;/h1&gt;&#xA;&lt;p&gt;In deze eerste aflevering van &lt;strong&gt;Red Team Talk&lt;/strong&gt; nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -2,53 +2,102 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Home | Joren on Joren&#39;s Site</title>
<link>https://joren.blog/</link>
<link>http://localhost:1313/</link>
<description>Recent content in Home | Joren on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Thu, 29 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/index.xml" rel="self" type="application/rss+xml" />
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>http://localhost:1313/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>http://localhost:1313/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking</title>
<link>http://localhost:1313/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/project/project-3/</guid>
<description>&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>http://localhost:1313/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>http://localhost:1313/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001—a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>http://localhost:1313/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>http://localhost:1313/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/blog/post-10/</guid>
<description>&lt;h1 id=&#34;the-smart-home-trap-isolate-or-be-owned&#34;&gt;The Smart Home Trap: Isolate or Be Owned&lt;/h1&gt;&#xA;&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Building My Hugo Website on a VPS</title>
<link>https://joren.blog/project/project-2/</link>
<link>http://localhost:1313/project/project-2/</link>
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-2/</guid>
<guid>http://localhost:1313/project/project-2/</guid>
<description>&lt;p&gt;I built my personal blog using &lt;a href=&#34;https://gohugo.io/&#34;&#xA;&#xA;&#xA;&#xA;&#xA; target=&#34;_blank&#34;&#xA; &#xA;&#xA;&#xA;&gt;Hugo&lt;/a&gt; and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Heres how the process went from site generation to live deployment.&lt;/p&gt;</description>
</item>
<item>
<title>DRMDTool Project</title>
<link>https://joren.blog/project/project-1/</link>
<link>http://localhost:1313/project/project-1/</link>
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-1/</guid>
<guid>http://localhost:1313/project/project-1/</guid>
<description>&lt;p&gt;DRMDTool is an automation-centric utility designed to streamline the processing of &lt;code&gt;.drmd&lt;/code&gt; files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<link>http://localhost:1313/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;h1 id=&#34;red-team-talk-een-blik-achter-de-schermen-bij-offensive-security&#34;&gt;Red Team Talk: Een Blik Achter de Schermen bij Offensive Security&lt;/h1&gt;&#xA;&lt;p&gt;In deze eerste aflevering van &lt;strong&gt;Red Team Talk&lt;/strong&gt; nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<link>http://localhost:1313/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h1 id=&#34;cyber-defence-on-the-digital-frontline-a-mission-with-nato&#34;&gt;Cyber Defence on the Digital Frontline: A Mission with NATO&lt;/h1&gt;&#xA;&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<link>http://localhost:1313/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;h1 id=&#34;reversing-rebuilding-and-failing-better-my-cyber-security-challenge-belgium-qualifier-experience&#34;&gt;Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience&lt;/h1&gt;&#xA;&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<link>http://localhost:1313/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;h1 id=&#34;securing-cyberspace-belgian-cyber-command-at-howest&#34;&gt;Securing Cyberspace: Belgian Cyber Command at Howest&lt;/h1&gt;&#xA;&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
<guid>http://localhost:1313/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>

View File

@ -4,7 +4,7 @@
"lang": "en",
"display": "fullscreen",
"orientation" : "portrait",
"start_url": "https://joren.blog/?utm_source=web_app_manifest",
"start_url": "http://localhost:1313/?utm_source=web_app_manifest",
"background_color": "#0e1015",
"theme_color": "#18b0a2",

File diff suppressed because one or more lines are too long

View File

@ -2,24 +2,31 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Recent Projects on Joren&#39;s Site</title>
<link>https://joren.blog/project/</link>
<link>http://localhost:1313/project/</link>
<description>Recent content in Recent Projects on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Thu, 29 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/project/index.xml" rel="self" type="application/rss+xml" />
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="http://localhost:1313/project/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Lean and Local: DNS, VPN, IRC and Ad Blocking with Alpine Linux</title>
<link>http://localhost:1313/project/project-3/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>http://localhost:1313/project/project-3/</guid>
<description>&lt;h1 id=&#34;lean-and-local-dns-vpn-irc-and-ad-blocking-with-alpine-linux&#34;&gt;Lean and Local: DNS, VPN, IRC and Ad Blocking with Alpine Linux&lt;/h1&gt;&#xA;&lt;p&gt;Running a full-featured network stack on old hardware isnt just possible, its efficient. This post covers how I configured Alpine Linux as a diskless system hosting DNS resolution, ad blocking, VPN access, and a local IRC server.&lt;/p&gt;</description>
</item>
<item>
<title>Building My Hugo Website on a VPS</title>
<link>https://joren.blog/project/project-2/</link>
<link>http://localhost:1313/project/project-2/</link>
<pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-2/</guid>
<guid>http://localhost:1313/project/project-2/</guid>
<description>&lt;p&gt;I built my personal blog using &lt;a href=&#34;https://gohugo.io/&#34;&#xA;&#xA;&#xA;&#xA;&#xA; target=&#34;_blank&#34;&#xA; &#xA;&#xA;&#xA;&gt;Hugo&lt;/a&gt; and deployed it on a lightweight Alpine Linux VPS. I chose this setup to have full control, keep things simple, and avoid bloated platforms or services. Heres how the process went from site generation to live deployment.&lt;/p&gt;</description>
</item>
<item>
<title>DRMDTool Project</title>
<link>https://joren.blog/project/project-1/</link>
<link>http://localhost:1313/project/project-1/</link>
<pubDate>Wed, 21 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/project/project-1/</guid>
<guid>http://localhost:1313/project/project-1/</guid>
<description>&lt;p&gt;DRMDTool is an automation-centric utility designed to streamline the processing of &lt;code&gt;.drmd&lt;/code&gt; files by tightly integrating with the N_m3u8DL-RE downloader. The tool offers robust automation via a watch folder and an intuitive web-based interface, significantly reducing the friction for managing and processing DRM-protected streaming content.&lt;/p&gt;</description>
</item>
</channel>

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@ -2,57 +2,66 @@
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
<loc>https://joren.blog/project/project-2/</loc>
<loc>http://localhost:1313/categories/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/categories/cybersecurity/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/categories/network/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/categories/offensive/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/blog/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/blog/post-5/</loc>
<lastmod>2025-05-30T00:00:00+00:00</lastmod>
</url><url>
<loc>http://localhost:1313/project/project-2/</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/</loc>
<loc>http://localhost:1313/project/</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/project/</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/project/project-1/</loc>
<loc>http://localhost:1313/project/project-1/</loc>
<lastmod>2025-05-21T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/</loc>
<loc>http://localhost:1313/categories/interview/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/cybersecurity/</loc>
<loc>http://localhost:1313/categories/podcast/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/interview/</loc>
<loc>http://localhost:1313/blog/post-4/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/podcast/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/blog/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/blog/post-4/</loc>
<lastmod>2025-05-20T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/blog/post-1/</loc>
<loc>http://localhost:1313/blog/post-1/</loc>
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/event/</loc>
<loc>http://localhost:1313/categories/event/</loc>
<lastmod>2025-05-13T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/ctf/</loc>
<loc>http://localhost:1313/categories/ctf/</loc>
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/education/</loc>
<loc>http://localhost:1313/categories/education/</loc>
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/blog/post-2/</loc>
<loc>http://localhost:1313/blog/post-2/</loc>
<lastmod>2025-03-15T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/categories/defense/</loc>
<loc>http://localhost:1313/categories/defense/</loc>
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/blog/post-3/</loc>
<loc>http://localhost:1313/blog/post-3/</loc>
<lastmod>2024-11-12T00:00:00+00:00</lastmod>
</url><url>
<loc>https://joren.blog/tags/</loc>
<loc>http://localhost:1313/tags/</loc>
</url>
</urlset>

View File

@ -1,2 +1,2 @@
<script>window.location.replace("\/");</script>
<script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script><script>window.location.replace("\/");</script>

View File

@ -2,10 +2,10 @@
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Tags on Joren&#39;s Site</title>
<link>https://joren.blog/tags/</link>
<link>http://localhost:1313/tags/</link>
<description>Recent content in Tags on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<atom:link href="https://joren.blog/tags/index.xml" rel="self" type="application/rss+xml" />
<atom:link href="http://localhost:1313/tags/index.xml" rel="self" type="application/rss+xml" />
</channel>
</rss>