blog-howest/public/blog/index.xml
2025-05-31 14:39:33 +02:00

83 lines
7.0 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Recent Posts on Joren&#39;s Site</title>
<link>https://joren.blog/blog/</link>
<description>Recent content in Recent Posts on Joren&#39;s Site</description>
<generator>Hugo</generator>
<language>en</language>
<lastBuildDate>Fri, 30 May 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://joren.blog/blog/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Cheap Camera, Expensive Risk: Hacking an IoT PTZ Camera</title>
<link>https://joren.blog/blog/post-8/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-8/</guid>
<description>&lt;p&gt;When you pay €22.95 for a pan-tilt-zoom security camera, youre not buying enterprise-grade security. But what if youre also buying root access through an SD card?&lt;/p&gt;</description>
</item>
<item>
<title>Kerberos Under Siege: Abusing the Trust Backbone of Windows Domains</title>
<link>https://joren.blog/blog/post-7/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-7/</guid>
<description>&lt;p&gt;Kerberos, introduced to Windows with Active Directory in 2000, is widely seen as a secure, modern replacement for NTLM. And yet, in the hands of an attacker, it becomes a double-edged sword. This post explores how Kerberos works, and how it can be abused through techniques like &lt;strong&gt;Kerberoasting&lt;/strong&gt;, &lt;strong&gt;delegation abuse&lt;/strong&gt;, and &lt;strong&gt;ticket impersonation&lt;/strong&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>Matrix: Building a Decentralized Communication Future</title>
<link>https://joren.blog/blog/post-6/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-6/</guid>
<description>&lt;p&gt;If youve ever switched between Slack, WhatsApp, Discord, Teams, Signal and Telegram in a single day, youve felt the cost of digital fragmentation. We live in a world where communication is siloed into centralized apps, each with its own rules, limits and vulnerabilities. Matrix proposes an alternative: a universal, open, decentralized protocol for real-time communication, where users control their data and messaging isn&amp;rsquo;t trapped in walled gardens.&lt;/p&gt;</description>
</item>
<item>
<title>Seiko SARV001: The JDM Sleeper That Punches Above Its Weight</title>
<link>https://joren.blog/blog/post-9/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-9/</guid>
<description>&lt;p&gt;In the world of horology, the Japanese Domestic Market (JDM) often hides treasures that fly under the radar. One such gem is the Seiko SARV001, a watch that combines classic design, reliable mechanics, and exceptional value.&lt;/p&gt;</description>
</item>
<item>
<title>Silent Interception: Exploiting LLMNR, NBT-NS, mDNS and IPv6 in Modern Networks</title>
<link>https://joren.blog/blog/post-5/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-5/</guid>
<description>&lt;p&gt;In many internal networks, outdated or misconfigured protocols silently create attack surfaces. This post explores how attackers abuse name resolution fallbacks and IPv6 autoconfiguration to capture and relay NTLM credentials using &lt;code&gt;Responder&lt;/code&gt; and &lt;code&gt;mitm6&lt;/code&gt;.&lt;/p&gt;</description>
</item>
<item>
<title>The Smart Home Trap: Isolate or Be Owned</title>
<link>https://joren.blog/blog/post-10/</link>
<pubDate>Fri, 30 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-10/</guid>
<description>&lt;p&gt;Smart homes are convenient. But with convenience comes risk. If your doorbell runs Linux, talks to Chinese cloud servers, and sits on the same network as your work laptop, you&amp;rsquo;ve got a problem. The fix? Segmentation. This post explores how to use VLANs and firewall rules to quarantine IoT devices and minimize lateral movement, even on a home budget.&lt;/p&gt;</description>
</item>
<item>
<title>Red Team Talk: Een Blik Achter de Schermen bij Offensive Security</title>
<link>https://joren.blog/blog/post-4/</link>
<pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-4/</guid>
<description>&lt;p&gt;In Red Team Talk nemen wij, Joren Schipman en Mattia Punjwani, studenten Cybersecurity aan Howest, jullie mee in een gesprek met &lt;strong&gt;Thomas Castronovo&lt;/strong&gt;, ethical hacker en consultant bij Deloitte. Samen duiken we in de wereld van offensieve security, red teaming, en de realiteit van een carrière als pentester.&lt;/p&gt;</description>
</item>
<item>
<title>Cyber Defence on the Digital Frontline: A Mission with NATO</title>
<link>https://joren.blog/blog/post-1/</link>
<pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-1/</guid>
<description>&lt;h4 id=&#34;on-a-mission-with-nato-cyber-defence-on-the-frontline&#34;&gt;On a Mission with NATO: Cyber Defence on the Frontline&lt;/h4&gt;&#xA;&lt;p&gt;Howests ongoing commitment to world-class cybersecurity training took center stage again as six lecturers from the Cyber Security program joined forces with experts from Latvia, Luxembourg and Belgium in one of NATO&amp;rsquo;s most intensive simulations: the Locked Shields exercise, hosted by the Cooperative Cyber Defence Centre of Excellence (CCDCOE). Now in its fifth year of participation, the Howest team shared their firsthand experiences at a special evening talk at Howest Bruges.&lt;/p&gt;</description>
</item>
<item>
<title>Reversing, Rebuilding, and Failing Better: My Cyber Security Challenge Belgium Qualifier Experience</title>
<link>https://joren.blog/blog/post-2/</link>
<pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-2/</guid>
<description>&lt;p&gt;On March 14 and 15, I joined the Cyber Security Challenge Belgium qualifiers with three teammates. For two days, we threw ourselves at CTF challenges covering binary exploitation, Android reversing, cryptography, and more.&lt;/p&gt;</description>
</item>
<item>
<title>Securing Cyberspace: Belgian Cyber Command at Howest</title>
<link>https://joren.blog/blog/post-3/</link>
<pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
<guid>https://joren.blog/blog/post-3/</guid>
<description>&lt;p&gt;On November 12, we had the opportunity to attend a Tech&amp;amp;Meet session unlike any other. The speaker was &lt;strong&gt;Colonel Gunther Godefridis&lt;/strong&gt;, Director for Development &amp;amp; Readiness at Belgian Cyber Command, and the topic: safeguarding our country in the digital domain.&lt;/p&gt;</description>
</item>
</channel>
</rss>