InfoSec and Cryptography
Display Contents of SSL Certificate from PEM File
A one-liner to display all contents of a SSL public key file ... [Read More]
Convert OPENSSH key to RSA type
Use ssh-keygen to convert an OPENSSH key to RSA format ... [Read More]
SSH Private key Authentication to Linux on a Windows Machine
Learn how to use private certificate files to automatically authenticate to SSH servers. No password needed! ... [Read More]
Ping Sweep Without Nmap with Native Tools in Linux, Windows, macOS
Ping sweeping is a basic technique to find active hosts on a network. You might be looking for a particular host in your infrastructure, like a network printer, or you simply want to assign a static IP to a new ... [Read More]
Fix SSH Certificate Authentication in Linux
A guide on how to fix SSH cert authentication when it doesn't work ... [Read More]
How to create a PFX file using OpenSSL
In this guide we take a look on how to create a PFX file, if you need just the opposite: extracting the private, public keys from a PFX file, follow the tutorial here ... [Read More]
How to extract the private key, public key and CA cert from PFX
A pfx file is technically a container that contains the private key, public key of an SSL certificate, packed together with the signer CA's certificate all in one in a password protected single file. Here are the steps to extract ... [Read More]
Base64 Encoder and Decoder Algorithm in PowerShell – with Examples
The idea of encoding and decoding to- and from Base64 using PowerShell is based on the very same algorithm as we used in our Python example. In this short article we go through the process of encoding and then decoding ... [Read More]
Base64 Encoder and Decoder Algorithm from Scratch in Python
In Python there is a built-in Base64 encoder/decoder ready to use. Here is a very simple example on how to encode and decode using the built-in base64 library ... [Read More]
Base64 Encoding Explained with Examples
Have you ever been wondering why SSL certificates have a strange code in their body, that seemingly only consists of letters, numbers, the "+" and the "/" characters? If you've ever checked the actual content of a saved email, the ... [Read More]
Is it safe to visit a webpage with an expired SSL certificate?
Does expired mean it is not working anymore? When an SSL certificate is signed, it gets an expiry date. It doesn't matter if it is "self-signed" - meaning that a not trusted server signed it (for instance the webserver itself) ... [Read More]
Create and export a Let’s Encrypt Wildcard SSL certificate in a PFX format
In this short guide we have create a free Let's Encrypt wildcard certificate. Before you Begin We'll need a fresh installation of Ubuntu or Debian linux. The box doesn't need to b e publicly accessible as we will use DNS ... [Read More]
Set up Enforced TLS for on-prem Exchange 2019
This guide is for on-premises Exchange deployments. If you are interested in enforced TLS on Office365 tenants, please click HERE Opportunistic Exchange - like most modern email systems - has the facility to transfer email messages encrypted. It is to ... [Read More]
Following the SSL Key Exchange with WireShark
We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... [Read More]
TLS/SSL – Does my public CA have my private key??? – part2
I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... [Read More]
TLS/SSL – Basics: How public-private Keys Work – part1
What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... [Read More]
Install Let’s Encrypt SSL for IIS – Step by Step
If you desperately need an SSL certificate signed by a publicly trusted CA, and you want it for free, Let’s Encrypt is certainly an option. They are valid for 3 months, and even though linux boxes are equipped to request ... [Read More]
Linux Egg Hunter – x86
Another interesting topic. First of all, what is an egghunter? You will encounter a scenario sooner or later when you can use a buffer overflow condition to execute your code on a target, but the memory space for that is ... [Read More]
Linux Reverse Shell – x86
Hopefully you have read my post about bind shells that covered a lot of basics which is really important to understand how these codes work. However, compared to bind shells reverse shells tend to be much more popular, because of ... [Read More]
Linux Bind Shell – x86
After the long intro, let’s just jump into it! First of all, this set of articles that are dealing with shellcodes written for linux machines running on 32bit CPU architecture (we’ll talk about the differences between 32bit and 64bit architectures ... [Read More]