I’ve seen a lot of articles online about AI and coding. Everyone seems to have a strong opinion, especially on LinkedIn, from the die-hard optimists to the deeply skeptical. But opinions don’t tell the whole story. I went looking for the data, and what the research shows paints a complicated, sometimes contradictory, picture.
Continue reading →
You probably hear it a lot: you should make your code secure! But… how?
When it comes to security, there are a plethora of measures you can implement.
Where do you start, and how do you know you’re doing the right thing?
Continue reading →
Welcome back to the final blog in de series "How to hack a box"!
In this blog we’ll cover the basics of Privilege Escalation and see it in practice on the Blocky box from Hack The Box.
Continue reading →
Welcome back to the blog series about how to hack a box!
In the past few blogs we’ve gone through a few steps which gives you an idea of how you can hack a box.
We went from the Introduction, to Exploration, to Gaining Access.
In this blog, we’ll cover the basics of Enumeration.
|
|
DISCLAIMER: Never attempt to execute one of these steps on a machine where you don’t have explicit permission for from the owner.
This is illegal and will get you in trouble.
|
Continue reading →
Welcome back to the blog series about how to hack a box! In this third post I’ll guide you through the second step: gaining access.
|
|
DISCLAIMER: Never attempt to execute one of these steps on a machine where you don’t have explicit permission for from the owner.
This is illegal and will get you in trouble.
|
Continue reading →
Welcome back to the blog series about how to hack a box! In the first blog I gave an introduction into the steps and prerequisites on How to hack a box.
In this second post I’ll guide you through the first step, which is exploration.
We will execute the steps on an actual box in Hack The Box, called Blocky.
|
|
DISCLAIMER: Never attempt to execute one of these steps on a machine where you don’t have explicit permission for from the owner.
This is illegal and will get you in trouble.
|
Continue reading →
Welcome to the blog series about how to hack a box! In this first post I’ll guide you through the global steps you can take to hack a box.
The steps are universal, so you can use them on any target which you have permission for.
In the next few posts we’ll go through each step in detail and try to hack a box in Hack The Box, called Blocky.
Continue reading →
In my last blog I gave you a small introduction into the term "Reverse Shell".
I described it as: "A Reverse Shell is where your target machine creates a connection to your machine, after which you get a shell on the target machine in which you can execute system commands."
It is similar to SSH, but without any encryption and the connection is created the other way around (from target to you, instead of you to the target).
Continue reading →
At JCore, we follow a three year program to become senior developers.
After following this program successfully, you will be promoted to the JDriven company.
In the final year, we have a specialization in a topic of our choice.
I chose to specialize myself further into security.
I have been studying this topic for some time now, even contributing to the fast track courses as a security teacher.
Until now, most of my time I spent on the defending side and now I want to take a look on "the other side".
So my specialization is all about attack, also described as joining "The Red Team".
Continue reading →
Now that it’s clear how to use an OAuth access_token in JWT to perform RBAC inside a REST service playing the role of resource server, it is time to see how to acquire such a token.
Continue reading →
How many lines of code do you actually need to implement external Role Based Access Control (RBAC) using OAuth, JWT with the new Spring Security features?
Lets find out!
Continue reading →
Recently we updated one of our internal applications from Spring Boot 1.5 to 2.1, which includes an update of Spring Security. After the update the OAuth2 security started to fail in the backend, it stopped recognizing the authentication.
The project is an Angular 4 application. It uses angular2-oauth2 (1.3) in the frontend, and spring-boot-security and spring-security-oauth2 on the backend. The frontend is responsible for authentication with our Bitbucket account. This information is then sent to the backend via a 'bearer' authentication token. We have a separate class extending WebSecurityConfigurerAdapter, annotated with @EnableOAuth2Client, to set our security settings.
Continue reading →