• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
OpenTechTips

OpenTechTips

Comprehensive IT Guides for Pros and Enthusiasts

MENUMENU
  • HOME
  • ALL TOPICS
    • Exchange
    • InfoSec
    • Linux
    • Networking
    • Scripting
      • PowerShell
    • SSL
    • Tools
    • Virtualization
    • Web
    • Windows
  • ABOUT
  • SUBSCRIBE

InfoSec


InfoSec and Cryptography


InfoSec

Display Contents of SSL Certificate from PEM File

May 16, 2022 Zsolt Agoston
A one-liner to display all contents of a SSL public key file ... [Read More]
InfoSec

Convert OPENSSH key to RSA type

May 13, 2022 Zsolt Agoston
Use ssh-keygen to convert an OPENSSH key to RSA format ... [Read More]
InfoSec

SSH Private key Authentication to Linux on a Windows Machine

April 20, 2022 Zsolt Agoston
Learn how to use private certificate files to automatically authenticate to SSH servers. No password needed! ... [Read More]
InfoSec

Ping Sweep Without Nmap with Native Tools in Linux, Windows, macOS

November 12, 2020 Zsolt Agoston
Ping sweeping is a basic technique to find active hosts on a network. You might be looking for a particular host in your infrastructure, like a network printer, or you simply want to assign a static IP to a new ... [Read More]
InfoSec

Fix SSH Certificate Authentication in Linux

November 3, 2020 Zsolt Agoston
A guide on how to fix SSH cert authentication when it doesn't work ... [Read More]
InfoSec

How to create a PFX file using OpenSSL

June 28, 2020 Zsolt Agoston
In this guide we take a look on how to create a PFX file, if you need just the opposite: extracting the private, public keys from a PFX file, follow the tutorial here ... [Read More]
InfoSec

How to extract the private key, public key and CA cert from PFX

June 27, 2020 Zsolt Agoston
A pfx file is technically a container that contains the private key, public key of an SSL certificate, packed together with the signer CA's certificate all in one in a password protected single file. Here are the steps to extract ... [Read More]
InfoSec

Base64 Encoder and Decoder Algorithm in PowerShell – with Examples

May 31, 2020 Zsolt Agoston
The idea of encoding and decoding to- and from Base64 using PowerShell is based on the very same algorithm as we used in our Python example. In this short article we go through the process of encoding and then decoding ... [Read More]
InfoSec

Base64 Encoder and Decoder Algorithm from Scratch in Python

May 29, 2020 Zsolt Agoston
In Python there is a built-in Base64 encoder/decoder ready to use. Here is a very simple example on how to encode and decode using the built-in base64 library ... [Read More]
InfoSec

Base64 Encoding Explained with Examples

May 27, 2020 Zsolt Agoston
Have you ever been wondering why SSL certificates have a strange code in their body, that seemingly only consists of letters, numbers, the "+" and the "/" characters? If you've ever checked the actual content of a saved email, the ... [Read More]
InfoSec

Is it safe to visit a webpage with an expired SSL certificate?

May 16, 2020 Zsolt Agoston
Does expired mean it is not working anymore? When an SSL certificate is signed, it gets an expiry date. It doesn't matter if it is "self-signed" - meaning that a not trusted server signed it (for instance the webserver itself) ... [Read More]
InfoSec

Create and export a Let’s Encrypt Wildcard SSL certificate in a PFX format

May 8, 2020 Zsolt Agoston
In this short guide we have create a free Let's Encrypt wildcard certificate. Before you Begin We'll need a fresh installation of Ubuntu or Debian linux. The box doesn't need to b e publicly accessible as we will use DNS ... [Read More]
InfoSec

Set up Enforced TLS for on-prem Exchange 2019

April 27, 2020 Zsolt Agoston
This guide is for on-premises Exchange deployments. If you are interested in enforced TLS on Office365 tenants, please click HERE Opportunistic Exchange - like most modern email systems - has the facility to transfer email messages encrypted. It is to ... [Read More]
InfoSec

Following the SSL Key Exchange with WireShark

April 14, 2020 Zsolt Agoston
We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... [Read More]
InfoSec

TLS/SSL – Does my public CA have my private key??? – part2

April 8, 2020 Zsolt Agoston
I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... [Read More]
InfoSec

TLS/SSL – Basics: How public-private Keys Work – part1

April 7, 2020 Zsolt Agoston
What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... [Read More]
InfoSec

Install Let’s Encrypt SSL for IIS – Step by Step

March 31, 2020 Zsolt Agoston
If you desperately need an SSL certificate signed by a publicly trusted CA, and you want it for free, Let’s Encrypt is certainly an option. They are valid for 3 months, and even though linux boxes are equipped to request ... [Read More]
InfoSec

Linux Egg Hunter – x86

March 24, 2020 Zsolt Agoston
Another interesting topic. First of all, what is an egghunter? You will encounter a scenario sooner or later when you can use a buffer overflow condition to execute your code on a target, but the memory space for that is ... [Read More]
InfoSec

Linux Reverse Shell – x86

March 23, 2020 Zsolt Agoston
Hopefully you have read my post about bind shells that covered a lot of basics which is really important to understand how these codes work. However, compared to bind shells reverse shells tend to be much more popular, because of ... [Read More]
InfoSec

Linux Bind Shell – x86

March 23, 2020 Zsolt Agoston
After the long intro, let’s just jump into it! First of all, this set of articles that are dealing with shellcodes written for linux machines running on 32bit CPU architecture (we’ll talk about the differences between 32bit and 64bit architectures ... [Read More]

Primary Sidebar

Tools

  • Terms of Use
  • Disclaimer
  • Privacy Policy
Manage your privacy

To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.

Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}
Manage your privacy
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Statistics

Marketing

Features
Always active

Always active
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}