<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>security on Georg Pauer</title>
    <link>/series/security/</link>
    <description>Recent content in security on Georg Pauer</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 13 Jan 2025 00:00:00 +0000</lastBuildDate><atom:link href="/series/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>outdated infrastructure references</title>
      <link>/posts/outdated-infrastructure-references/</link>
      <pubDate>Mon, 13 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>/posts/outdated-infrastructure-references/</guid>
      <description>While a lot of internet infrastructure is build on HTTP, things change occasional even a 301 leads to an 404. If there is at least some DNS entry and a server answering. A few NXDOMAIN later this led me to the rabbit hole of systematic approaches about abandoned infrastructure. While domain sniping is so common there is even a Wikipedia entry and is (as far as I observed) often used to farm the traffic for advertisements.</description>
    </item>
    
    <item>
      <title>Kubernetes Security - CtF style learning &amp; pentesting</title>
      <link>/posts/k8s-security-learning2/</link>
      <pubDate>Fri, 26 Jul 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-security-learning2/</guid>
      <description>More resources to have fun with kubernetes from a security point of view and for learning:
challenges If you had fun with the Damn Vulnerable Web Application (DVWA), there is something equivalent for Kubernetes from Madhu Akula: Kubernetes Goat. You can also deploy your own playground.
K8S lan party seems also quite promising. (from Wiz)
tooling offensive Peirates is a bit alike a (still lightweight) Metasploit (payload) for k8s. One &amp;ldquo;batteries included&amp;rdquo; binary.</description>
    </item>
    
    <item>
      <title>hints for using ssh</title>
      <link>/posts/ssh-usage-hints/</link>
      <pubDate>Sun, 10 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/ssh-usage-hints/</guid>
      <description>After some ssh -fNT -L 6443:10.0.6.2:6443 bastion &amp;amp; again, it is probably time to refer to some SSH hints. Yes, everything is referenced in the man ssh page. But sometimes I am lazy, too. (And for now I blissfully ignore, that there are multiple ssh implementations and focus just on the using ssh part)
ProxyJump is probably my most used ssh config for ssh (just after User and having a nice alias).</description>
    </item>
    
    <item>
      <title>notes from creating TLS setups</title>
      <link>/posts/tls-notes/</link>
      <pubDate>Sat, 09 Mar 2024 00:00:00 +0000</pubDate>
      
      <guid>/posts/tls-notes/</guid>
      <description>Sometimes you need to debug a generated TLS certificate. I always forget CLI arguments, thus as a reminder for myself:
Let&amp;rsquo;s create a dummy RSA certificate for testing with openssl, quick and dirty
openssl genpkey -algorithm RSA -out privatekey.pem -pkeyopt rsa_keygen_bits:4096
create an RSA based key
openssl req -new -key privatekey.pem -out certrequest.csr
interactive generate the cert request. You can review it later with openssl req -text -noout -in certrequest.csr.</description>
    </item>
    
    <item>
      <title>risks of embedded bare repositories</title>
      <link>/posts/embedded-bare-git-repositories/</link>
      <pubDate>Sun, 29 Oct 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/embedded-bare-git-repositories/</guid>
      <description>Have you ever wondered, why your IDE asks you, if you &amp;ldquo;trust&amp;rdquo; the code you checked out via git?
While the risks of embedded bare repositories is well described (more details here), I suspect that it will stay exploitable for quite some time.
There is an opt-in mitigation in setting safe.bareRepository to explicit with git 2.38.0. Also a proof of concept is available.
Just don&amp;rsquo;t forget the even more obvious risk with .</description>
    </item>
    
    <item>
      <title>thread modelling 101 (DE)</title>
      <link>/posts/thread-modeling-101-german/</link>
      <pubDate>Thu, 10 Aug 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/thread-modeling-101-german/</guid>
      <description>I really like the Threat Modeling 101 – Wie fange ich eigentlich an? blogpost from Kevin Peters at CodeCentric for a nice, still high level overview:
following the OWASP thread modeling four question framework: What are we working on? What can go wrong? What are we going to do about it? Did we do a good job? OWASP Threat Dragon as modelling tool including data flow, data transforming processes and external services with the different focus asset orientated - what do we even want to protect?</description>
    </item>
    
    <item>
      <title>GPN21</title>
      <link>/posts/gpn21/</link>
      <pubDate>Thu, 15 Jun 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/gpn21/</guid>
      <description>recordings from GPN21 are online. (Already enjoyed From 0 to Kubernetes, Modern Observability .. LGTM Stack, buffer overflow, Seitenkanalanalyse der SHAKE-Funktion in CRYSTALS-Dilithium, mit Mathematik API übernehmen - more to follow 😀 ) O-Auth intro</description>
    </item>
    
    <item>
      <title>a crypto near miss</title>
      <link>/posts/crypto-near-miss/</link>
      <pubDate>Tue, 16 May 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/crypto-near-miss/</guid>
      <description>A write up/post-mortem: &amp;ldquo;A Cryptographic Near Miss&amp;rdquo; about a vulnerability in Go crypto/elliptic</description>
    </item>
    
    <item>
      <title>eBPF</title>
      <link>/posts/ebpf-intro/</link>
      <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
      
      <guid>/posts/ebpf-intro/</guid>
      <description>In order to get on track with eBPF maybe check out the book by Liz Rice.</description>
    </item>
    
    <item>
      <title>Kubernetes Security - book and learning environment</title>
      <link>/posts/k8s-security-learning/</link>
      <pubDate>Fri, 04 Nov 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/k8s-security-learning/</guid>
      <description>on hackingkubernetes you can get the first half of the ORlly book &amp;ldquo;Hacking Kubernetes&amp;rdquo;, so the pod &amp;amp; runtime specific part, as well as supply chain related: controlplaneio/simulator - simulator setup for creating environments, where you can try attacking and debugging k8s (a bit AWS specific)</description>
    </item>
    
    <item>
      <title>yubikey details</title>
      <link>/posts/yubikey/</link>
      <pubDate>Mon, 19 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/yubikey/</guid>
      <description>hints for ssh &amp;amp; yubikey</description>
    </item>
    
    <item>
      <title>SE-Linux game</title>
      <link>/posts/selinuxgame/</link>
      <pubDate>Wed, 27 Apr 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/selinuxgame/</guid>
      <description>SELinuxGame might be worth some time (e.g. CTF preparation)</description>
    </item>
    
    <item>
      <title>evil compiler</title>
      <link>/posts/evil-compiler/</link>
      <pubDate>Tue, 19 Apr 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/evil-compiler/</guid>
      <description>In 1984 was a nice idea at turing award acceptance speech how an evil compiler can do a supply chain attack. Here is a proof of concept</description>
    </item>
    
    <item>
      <title>bash pipe - how to fail</title>
      <link>/posts/bash-pipe-failures/</link>
      <pubDate>Wed, 13 Apr 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/bash-pipe-failures/</guid>
      <description>Bash Pipes and how failures do (not) cascade: rachelbythebay - and remember set -o pipefail (and of cause -eu, too). But be aware, that this is not bullet prove.</description>
    </item>
    
    <item>
      <title>CVE-2022-0492 for fun</title>
      <link>/posts/escaping-containers-with-cve-2022-0492/</link>
      <pubDate>Tue, 08 Mar 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/escaping-containers-with-cve-2022-0492/</guid>
      <description>Escaping privileged containers for fun with CVE-2022-0492</description>
    </item>
    
    <item>
      <title>rC3 nowhere suggestions</title>
      <link>/posts/rc3-nowhere-suggestions/</link>
      <pubDate>Sun, 09 Jan 2022 00:00:00 +0000</pubDate>
      
      <guid>/posts/rc3-nowhere-suggestions/</guid>
      <description>from rC3 nowhere: Kubernetes security (more recordings at media.ccc.de: algebra in &amp;ldquo;Math for Hackers&amp;rdquo;, some more security relevant stuff, social, infrastructure and so much more)</description>
    </item>
    
    <item>
      <title>inject by unicode</title>
      <link>/posts/code-injection-by-unicode-formating/</link>
      <pubDate>Mon, 01 Nov 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/code-injection-by-unicode-formating/</guid>
      <description>code injection by unicode formating: paper and short web version</description>
    </item>
    
    <item>
      <title>ARM only buffer overflow</title>
      <link>/posts/arm-only-buffer-overflows/</link>
      <pubDate>Tue, 26 Oct 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/arm-only-buffer-overflows/</guid>
      <description>ARM only BufferOverflows + exploit write up</description>
    </item>
    
    <item>
      <title>how to script in bash</title>
      <link>/posts/how-to-bash-script/</link>
      <pubDate>Tue, 05 Oct 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/how-to-bash-script/</guid>
      <description>From the OSAD (Open Source Automation Days): how to script bash in 2021 (error checking, speedup, data types, fake namespaces,..)</description>
    </item>
    
    <item>
      <title>write up: from stolen laptop to inside the company network</title>
      <link>/posts/writeup-from-stolen-laptop-to-inside-the-company-network/</link>
      <pubDate>Thu, 29 Jul 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/writeup-from-stolen-laptop-to-inside-the-company-network/</guid>
      <description>Why ISMS is worried about hardware theft: from stolen laptop to inside the company network.</description>
    </item>
    
    <item>
      <title>memory leak with C&#43;&#43; runtime</title>
      <link>/posts/memory-leak-with-c&#43;&#43;-runtime/</link>
      <pubDate>Wed, 23 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/memory-leak-with-c&#43;&#43;-runtime/</guid>
      <description>A nice example how to memory leak with the C++ runtime.</description>
    </item>
    
    <item>
      <title>homomorphic encryption</title>
      <link>/posts/homomorpic-encryption/</link>
      <pubDate>Wed, 16 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/homomorpic-encryption/</guid>
      <description>Google has some source code for homomorphic encryption (an FEH compiler for C++).</description>
    </item>
    
    <item>
      <title>command-line-secrets</title>
      <link>/posts/cli-secrets/</link>
      <pubDate>Mon, 14 Jun 2021 00:00:00 +0000</pubDate>
      
      <guid>/posts/cli-secrets/</guid>
      <description>Watch out to not accidental leak credentials in the shell/bash.</description>
    </item>
    
  </channel>
</rss>
