Refining The Art of Security

Recent Posts

4reW's Avatar

Setting up and running Snort on Ubuntu

Snort is an Intrusion Detection and Prevention System (IDPS) designed to protect networks against malicious traffic and requests. As it is capable of detecting suspicious activity, such as malicious requests or traffic, it is able to take action to block such activities before they reach their destinations. IDPS systems are an integral part of any security infrastructure, as they protect agains...

Snort is an Intrusion Detection and Prevention System (IDPS) designed to protect networks against malicious traffic and requests. As it is capable of detecting suspicious activity, such as malicious requests or traffic, it is able to take action to block such activities before they reach their de...

4reW's Avatar

Using Cipher Block Chaining(CBC cipher) to Encrypt Access Granting Certificates

This project explores the use of Cipher Block Chaining (CBC) block cipher technology for generating encrypted access certificates with configurable expiration dates. This secure system involves a primary server authority certificate for issuing and validating additional access certificates. This system provides an efficient way of providing access only for the required time period while ensurin...

This project explores the use of Cipher Block Chaining (CBC) block cipher technology for generating encrypted access certificates with configurable expiration dates. This secure system involves a primary server authority certificate for issuing and validating additional access certificates. This ...

4reW's Avatar

Powershell AMSI Lab - evading using obfuscation

Many developers have likely encountered the frustration of having their code flagged as a virus or malware by Windows Defender, even when the code is legitimate and performing necessary functions like accessing system functions or making TCP connections. It becomes even more frustrating when threat actors are able to bypass this security. To address these concerns, Windows 10 introduced the An...

Many developers have likely encountered the frustration of having their code flagged as a virus or malware by Windows Defender, even when the code is legitimate and performing necessary functions like accessing system functions or making TCP connections. It becomes even more frustrating when thre...


  • #
  • Page 1 of 1
  • #