I’ve been interested in canary style honeypots for a while and I finally got around to installing one. I thought that I would document the process here for future reference and my notes might be useful for someone else who wants to set one up without spending much money.
Continue reading “Open Canary”
Before my new let’s encrypt certificate expired I needed to setup an auto-renewal script.
Continue reading “Let’s Encrypt Renewal”
While setting up a cloud service I decided to finally give letsencrypt.org a try.
Continue reading “Let’s Encrypt”
I am going to start out by diving into reverse engineering and memory corruption exploits. I have done some work with Intel x86 assembly in the past especially when working through my Offensive Security certifications. However my experience has 90% been in 32 bit Windows exploit development with Olly Debug and other similar tools. I want to focus more on Linux tools and reverse engineering type challenges. My plan is to start with some of the challenges on exploit-exercises.com while studying gdb, radare, and ida. I am also starting this book Practical Reverse Engineering. I expect a lot of the books topics to be over my head at first and I’ll need to branch off to brush up on different topics.
As I complete challenges and learn new tools I’ll be posting walkthroughs and notes here for reference. I may also take breaks from the assembly topics so I can complete vulnhub.com challenges for fun.