⚠️ Museum post
This post is a piece of history of this blog, imported from older times where practices were different. It remains online for the sake of sharing information, but should not be used at face value anymore.
So every now and then I give introductory courses to embedded systems security. To keep the students engaged, I mix in a CTF: most practical cases are actually challenges that earn points. At the end of the course, the team that has gained the most points wins a prize.
... ➦⚠️ Museum post
This post is a piece of history of this blog, imported from older times where practices were different. It remains online for the sake of sharing information, but should not be used at face value anymore.
On a previous post, I explained how I set up a virtual router between my home network and my ISP box. That setup was later enriched with the Suricata IPS, running using the NFQUEUE bindings to check all traffic that went through my router.
... ➦⚠️ Museum post
This post is a piece of history of this blog, imported from older times where practices were different. It remains online for the sake of sharing information, but should not be used at face value anymore.
Icinga now uses PHP-FPM. Part of this installation guide needs an update to reflect that, I’ll cover it later on when my current home projects are done.
... ➦⚠️ Museum post
This post is a piece of history of this blog, imported from older times where practices were different. It remains online for the sake of sharing information, but should not be used at face value anymore.
If you’re reading this article, you’ve probably already been there at some point: when you’re the guy that’s comfortable with computers in any social circle, you end up with people asking you to fix their computers. Following that, and granted the person who’s asking you this is not a complete asshole, you gently accept and try to see how you can help. Well, at least, that’s what I do.
... ➦⚠️ Museum post
This post is a piece of history of this blog, imported from older times where practices were different. It remains online for the sake of sharing information, but should not be used at face value anymore.
In a previous post, I described how to set up a basic router in a virtual machine. One of the things I didn’t include was setting up an IPS to analyze the network traffic and detect bad behaviour.
... ➦