-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
12 lines (12 loc) · 14.9 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
<!doctype html><html lang=en dir=auto><head><meta name=generator content="Hugo 0.127.0"><meta charset=utf-8><meta http-equiv=X-UA-Compatible content="IE=edge"><meta name=viewport content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name=robots content="index, follow"><title>tracing bytes</title>
<meta name=description content><meta name=author content><link rel=canonical href=https://kraashen.github.io/><link crossorigin=anonymous href=/assets/css/stylesheet.b609c58d5c11bb90b1a54e04005d74ad1ddf22165eb79f5533967e57df9c3b50.css integrity="sha256-tgnFjVwRu5CxpU4EAF10rR3fIhZet59VM5Z+V9+cO1A=" rel="preload stylesheet" as=style><link rel=icon href=https://kraashen.github.io/favicon.ico><link rel=icon type=image/png sizes=16x16 href=https://kraashen.github.io/favicon-16x16.png><link rel=icon type=image/png sizes=32x32 href=https://kraashen.github.io/favicon-32x32.png><link rel=apple-touch-icon href=https://kraashen.github.io/apple-touch-icon.png><link rel=mask-icon href=https://kraashen.github.io/safari-pinned-tab.svg><meta name=theme-color content="#2e2e33"><meta name=msapplication-TileColor content="#2e2e33"><link rel=alternate type=application/rss+xml href=https://kraashen.github.io/index.xml><link rel=alternate hreflang=en href=https://kraashen.github.io/><noscript><style>#theme-toggle,.top-link{display:none}</style></noscript><meta property="og:title" content="Home"><meta property="og:description" content><meta property="og:type" content="website"><meta property="og:url" content="https://kraashen.github.io/"><meta name=twitter:card content="summary"><meta name=twitter:title content="Home"><meta name=twitter:description content><script type=application/ld+json>{"@context":"https://schema.org","@type":"Organization","name":"tracing bytes","url":"https://kraashen.github.io/","description":"","thumbnailUrl":"https://kraashen.github.io/favicon.ico","sameAs":[]}</script></head><body class="list dark" id=top><script>localStorage.getItem("pref-theme")==="light"&&document.body.classList.remove("dark")</script><header class=header><nav class=nav><div class=logo><a href=https://kraashen.github.io/ accesskey=h title="tracing bytes (Alt + H)">tracing bytes</a><div class=logo-switches><button id=theme-toggle accesskey=t title="(Alt + T)"><svg id="moon" xmlns="http://www.w3.org/2000/svg" width="24" height="18" viewBox="0 0 24 24" fill="none" stroke="currentcolor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M21 12.79A9 9 0 1111.21 3 7 7 0 0021 12.79z"/></svg><svg id="sun" xmlns="http://www.w3.org/2000/svg" width="24" height="18" viewBox="0 0 24 24" fill="none" stroke="currentcolor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><circle cx="12" cy="12" r="5"/><line x1="12" y1="1" x2="12" y2="3"/><line x1="12" y1="21" x2="12" y2="23"/><line x1="4.22" y1="4.22" x2="5.64" y2="5.64"/><line x1="18.36" y1="18.36" x2="19.78" y2="19.78"/><line x1="1" y1="12" x2="3" y2="12"/><line x1="21" y1="12" x2="23" y2="12"/><line x1="4.22" y1="19.78" x2="5.64" y2="18.36"/><line x1="18.36" y1="5.64" x2="19.78" y2="4.22"/></svg></button></div></div><ul id=menu><li><a href=https://kraashen.github.io/ title=Home><span class=active>Home</span></a></li><li><a href=https://kraashen.github.io/posts/ title=Posts><span>Posts</span></a></li><li><a href=https://kraashen.github.io/snippets/ title=Snippets><span>Snippets</span></a></li><li><a href=https://kraashen.github.io/my-library/ title="My Library"><span>My Library</span></a></li><li><a href=https://kraashen.github.io/interests/ title=Interests><span>Interests</span></a></li></ul></nav></header><main class=main><div class=post-content><blockquote><p>💭🖥🖱⌨🐧🕹📖</p></blockquote><blockquote><p>Software developer and systems engineer oscillating between cloud and baremetal.
Enthusiastic about technology, tinkering with computer systems, and software.
Interests include also infosec, games, Linux, baking, and things open source.</p></blockquote><blockquote><p>This dumpster fire contains posts and notes about programming, studying,
as well as joys and enthusiasm about tech things in general. Sometimes things off-topic.</p></blockquote></div><article class=first-entry><header class=entry-header><h2 class=entry-hint-parent>Homelab on the go with Tailscale</h2></header><div class=entry-content><p>Having a home lab and services such as PiHole, RSS reader, K3s, Home Assistant, and more is fun and all at home, but how to access them when leaving the house without opening up parts of the home network to the Internet? In this post, we’ll go through a setup of Tailscale VPN and running services such as PiHole on Debian server.</p></div><footer class=entry-footer><span title='2024-07-26 00:00:00 +0000 UTC'>July 26, 2024</span></footer><a class=entry-link aria-label="post link to Homelab on the go with Tailscale" href=https://kraashen.github.io/posts/2024-07-26-homelab-on-the-go-with-tailscale/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Simple LAN party network with Zyxel GS1900-24E managed switch</h2></header><div class=entry-content><p>Introduction We were about to have a LAN party during easter. Network setup was really simple: one consumer-grade 10/100/1000 router with a connection to the Internet with a NATted network, one port for the host of the party, and extending this network from another interface behind a switch for everyone else. Originally we had only 10/100 capable switch, but as the location we were in had now also support for faster uplink, we needed to upgrade the switch to get everything out of the bandwidth available....</p></div><footer class=entry-footer><span title='2018-03-30 00:00:00 +0000 UTC'>March 30, 2018</span></footer><a class=entry-link aria-label="post link to Simple LAN party network with Zyxel GS1900-24E managed switch" href=https://kraashen.github.io/posts/2018-03-30-simple-lan-party-network-with-zyxel-gs1900-24e-managed-switch/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Reverse Engineering With Radare - Binary internals</h2></header><div class=entry-content><p>In the previous post, basics and fundamentals for reverse engineering software were discussed. This time I thought about writing a bit more about getting a bit further in inspecting and understanding software binaries. In this post, we’ll take a look at one password guess reverse engineering challenge using Radare.
Goals The goal is to reverse engineer a simple binary and understanding of the flow of disassembled code, how to read it, and understand how it works....</p></div><footer class=entry-footer><span title='2018-03-11 00:00:00 +0000 UTC'>March 11, 2018</span></footer><a class=entry-link aria-label="post link to Reverse Engineering With Radare - Binary internals" href=https://kraashen.github.io/posts/2018-03-11-reverse-engineering-basics-with-radare-binary-internals/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Reverse Engineering With Radare - Fundamentals and Basics</h2></header><div class=entry-content><p>As I got more and more curious on how software works, I felt it essential as a software and systems engineer to start understanding deeper low-level internals of software. So I thought about diving more into the topic of reverse engineering from software developer’s perspective using an open source tool called Radare. There are plenty of extremely well written Radare tutorials on reverse engineering which may include topics such as finding hidden passwords and injection techniques....</p></div><footer class=entry-footer><span title='2018-01-22 00:00:00 +0000 UTC'>January 22, 2018</span></footer><a class=entry-link aria-label="post link to Reverse Engineering With Radare - Fundamentals and Basics" href=https://kraashen.github.io/posts/2018-01-22-reverse-engineering-basics-with-radare-fundamentals-and-basics/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Raspberry Pi Web Server Using Caddy and Github Webhooks</h2></header><div class=entry-content><p>After setting up the DMZ in my home network, it was time to get hands on with the actual server. I heard of a web server called Caddy, which is a HTTP/2 HTTPS-by-default web server written in Go. I got into Go as a programming language some time ago recently and I was a bit excited about a possibility of running a production capable web server with it on a Raspberry Pi....</p></div><footer class=entry-footer><span title='2017-10-28 16:57:26 +0300 +0300'>October 28, 2017</span></footer><a class=entry-link aria-label="post link to Raspberry Pi Web Server Using Caddy and Github Webhooks" href=https://kraashen.github.io/posts/2017-10-28-raspberry-pi-web-server-using-caddy-with-git-webhooks/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Mikrotik 493G with a Home DMZ</h2></header><div class=entry-content><p>In the previous post I showed one way to set up a home network using Mikrotik Routerboard. Next up in my project list was to set up a Raspberry Pi web server to host my own website and a blog (this one in fact). This required some tweaks to my home network set up as I needed to allow access to a device in my network from the public Internet. As Mikrotik allows nice configurability to do this kind of set ups, I dove into some of Mikrotik’s own manuals to start up with....</p></div><footer class=entry-footer><span title='2017-10-22 02:37:22 +0300 +0300'>October 22, 2017</span></footer><a class=entry-link aria-label="post link to Mikrotik 493G with a Home DMZ" href=https://kraashen.github.io/posts/2017-10-22-mikrotik-493g-with-a-home-dmz/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Setting up MikroTik 493G as a home router (+WLAN AP)</h2></header><div class=entry-content><p>MikroTik is a company that sells e.g. configurable network appliances for a decent price point. I thought that their routerboard could be great for both casual and home lab use, so I went and bought a second-hand routerboard to tinker with. It felt it would be a nice change and an addition to get hands-on and acquainted with setting up computer networks from the scratch besides looking at tcpdumps/whatnot
Routerboards have an operating system called RouterOS, which is developed by MikroTik and is based on Linux kernel....</p></div><footer class=entry-footer><span title='2017-10-15 23:39:06 +0300 +0300'>October 15, 2017</span></footer><a class=entry-link aria-label="post link to Setting up MikroTik 493G as a home router (+WLAN AP)" href=https://kraashen.github.io/posts/2017-10-15-setting-up-mikrotik-493g-as-a-home-router-wlan-ap/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Component analysis of popular free Android software</h2></header><div class=entry-content><p>In my previous post I took a look at some of the Privacytools.io guide’s Android applications and their respective OpenSSL versions due to an inspiration that a study gave me [1]. I also thought to continue this as a follow-up and take a look into some of the popular free Android software available on Google Play and tried to study what they are built upon.
Study set up Choose target Android applications based on common popularity among people and Play Store lists of popular free applications Collect the Android Application Packages (APK) from the Google Play Store Applications were downloaded on 2015-04-15 Use BOMTotal[2] service for scanning the application components Collect the Bill of Materials URLs, tool version identification, and software components including their respective versions Focus was on OpenSSL and getting familiar with 3rd party ad components Collect OpenSSL version history from the OpenSSL release notes and use the release intervals for ‘best before dates’ mentioned in the original study on Privacytools....</p></div><footer class=entry-footer><span title='2015-04-23 18:23:01 +0300 +0300'>April 23, 2015</span></footer><a class=entry-link aria-label="post link to Component analysis of popular free Android software" href=https://kraashen.github.io/posts/2015-04-23-component-analysis-of-popular-free-android-software/></a></article><article class=post-entry><header class=entry-header><h2 class=entry-hint-parent>Follow-up: Android privacy tools best served fresh</h2></header><div class=entry-content><p>Recently, there was a study published on OpenSSL versions used by privacy conscious software recommended in the Privacytools.io guide [1]. This study took a stance on not only the OpenSSL crypto library, but the components used by software critical to privacy and safety. The study revealed that many applications are using outdated components. As mobile world is becoming a significant part of how we communicate with people and mobile malware development in Q1 2014 continues to focus exclusively on the Android platform [2], this follow-up study focuses on Android applications mentioned in the study....</p></div><footer class=entry-footer><span title='2015-04-14 05:49:01 +0300 +0300'>April 14, 2015</span></footer><a class=entry-link aria-label="post link to Follow-up: Android privacy tools best served fresh" href=https://kraashen.github.io/posts/2015-04-14-follow-up-android-privacy-tools-best-served-fresh/></a></article></main><footer class=footer><span>© 2024 <a href=https://kraashen.github.io/>tracing bytes</a></span> ·
<span>Powered by
<a href=https://gohugo.io/ rel="noopener noreferrer" target=_blank>Hugo</a> &
<a href=https://github.com/adityatelange/hugo-PaperMod/ rel=noopener target=_blank>PaperMod</a></span></footer><a href=#top aria-label="go to top" title="Go to Top (Alt + G)" class=top-link id=top-link accesskey=g><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 12 6" fill="currentcolor"><path d="M12 6H0l6-6z"/></svg>
</a><script>let menu=document.getElementById("menu");menu&&(menu.scrollLeft=localStorage.getItem("menu-scroll-position"),menu.onscroll=function(){localStorage.setItem("menu-scroll-position",menu.scrollLeft)}),document.querySelectorAll('a[href^="#"]').forEach(e=>{e.addEventListener("click",function(e){e.preventDefault();var t=this.getAttribute("href").substr(1);window.matchMedia("(prefers-reduced-motion: reduce)").matches?document.querySelector(`[id='${decodeURIComponent(t)}']`).scrollIntoView():document.querySelector(`[id='${decodeURIComponent(t)}']`).scrollIntoView({behavior:"smooth"}),t==="top"?history.replaceState(null,null," "):history.pushState(null,null,`#${t}`)})})</script><script>var mybutton=document.getElementById("top-link");window.onscroll=function(){document.body.scrollTop>800||document.documentElement.scrollTop>800?(mybutton.style.visibility="visible",mybutton.style.opacity="1"):(mybutton.style.visibility="hidden",mybutton.style.opacity="0")}</script><script>document.getElementById("theme-toggle").addEventListener("click",()=>{document.body.className.includes("dark")?(document.body.classList.remove("dark"),localStorage.setItem("pref-theme","light")):(document.body.classList.add("dark"),localStorage.setItem("pref-theme","dark"))})</script></body></html>