Python Networking and Security

  • 5 min,  Information,  Networking and Security,  Python Networking and Security

    RFC-6125 TLS, MTLS

    Representation and Verification of Domain-Based Application ServiceIdentity within Internet Public Key Infrastructure Using X.509 (PKIX)Certificates in the Context of Transport Layer Security (TLS) Likewise, during TLSnegotiation, the server presents its notion of the service’s identityin the form of a public-key certificate that was issued by acertification authority (CA) in the context of the Internet PublicKey Infrastructure using X.509 [PKIX]. Informally, we can think ofthese identities as the client’s “reference identity” and theserver’s “presented identity” RFC 6125 – Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS) (ietf.org) Use Cases and Requirements for DNS-Based Authentication…

    Comments Off on RFC-6125 TLS, MTLS
  • Information,  Python Networking and Security

    SSL Self signed OpenSSL (and online cryptography with key)

    https – How to create self signed SSL certificate for test purposes? – Stack Overflow You can do this via openssl: Install openssl package (if you are using Windows, download binaries here). Generate private key: openssl genrsa 2048 > private.pem Generate the self signed certificate: openssl req -x509 -days 1000 -new -key private.pem -out public.pem If needed, create PFX: openssl pkcs12 -export -in public.pem -inkey private.pem -out mycert.pfx OpenSSL Binary https://wiki.openssl.org/index.php/Binaries OpenSSL for Windows Pre-compiled 64-bit (x64) and 32-bit (x86) 1.1.1 and 3.0 executables and libraries for Microsoft Windows Operating Systems with a dependency on the Microsoft Visual Studio 2015-2019 runtime and Microsoft Visual Studio 2015-2022 runtime respectively.The distribution may be used standalone or…

    Comments Off on SSL Self signed OpenSSL (and online cryptography with key)
  • 5 min,  azure,  Python Networking and Security

    5 min Security Management Identity Azure

    Scenario:Before: VM1 code, config, user cred/connection to SQL1New: Azure keyvault for storing, but VM1 needs access to key vault, hm…better way? No keys? Kan we have zero secrets in the code?Azure Managed Identity System assigned management identity User assigned management identity System assigned management identity (1 to 1) VM1(source)->Identity->System assigned->enable SQL1 (target)-> IAM->Add role assignment-> grant permission (i.e contributor)->Assign access to->VM1 Each identity is tightly coupled to the Azure resource This is a special type of service principal witch provide the following extra features: Automatic credential rotation, Better identity lifecycle management, when done with VM1 and rm it all associated identitys is also rm’ed. And we dont need to store…

    Comments Off on 5 min Security Management Identity Azure
  • Python,  Python Networking and Security

    Cryptography with Python – Caesar Cipher

    After reading (almost done) with: The Code Book : The Secret History of Codes and Code-Breaking Paperback – April 30, 2002by Simon Singh (Author) available at Amazon and so on I became fascinated with the history and the small stories that goes along with the different codes used and still being used today. Here is a link for viewing and programming cryptography: https://www.tutorialspoint.com/cryptography_with_python/cryptography_with_python_caesar_cipher.htm OverviewDouble Strength EncryptionPython Overview and InstallationReverse CipherCaesar CipherROT13 AlgorithmTransposition CipherEncryption of Transposition CipherDecryption of Transposition CipherEncryption of filesDecryption of filesBase64 Encoding & DecodingXOR ProcessMultiplicative CipherAffine CiphersHacking Monoalphabetic CipherSimple Substitution CipherTesting of Simple Substitution CipherDecryption of Simple Substitution CipherPython Modules of CryptographyUnderstanding Vignere CipherImplementing Vignere CipherOne Time Pad…

    Comments Off on Cryptography with Python – Caesar Cipher
  • Python,  Python Networking and Security

    Python for Cyber Security additional resources to learn

    The Cyber Defenders Program: https://medium.com/cyberdefenders/search?q=python So the plan is to do the second and third resource first and then move to the next. The first one is a course so…. Second, skip the most of the basic, repeat some from automating the boring stuff: https://automatetheboringstuff.com/ Chapter 5 – Dictionaries and Structuring Data = checkChapter 10 – Debugging = checkChapter 14 – Working with CSV Files (no linux on windows ok) and JSON Data = checkChapter 15 – Keeping Time, Scheduling Tasks, and Launching Programs = in progressChapter 17 – Manipulating Images Third, go through all and read, Cracking Codes with Python: https://inventwithpython.com/cracking/ Next are the rest of the lessons: Python…

    Comments Off on Python for Cyber Security additional resources to learn