Representation and Verification of Domain-Based Application ServiceIdentity within Internet Public Key Infrastructure Using X.509 (PKIX)Certificates in the Context of Transport Layer Security (TLS) Likewise, during TLSnegotiation, the server presents its notion of the service’s identityin the form of a public-key certificate that was issued by acertification authority (CA) in the context of the Internet PublicKey […]

SSL Self signed OpenSSL (and online cryptography with key)

https – How to create self signed SSL certificate for test purposes? – Stack Overflow You can do this via openssl: Install openssl package (if you are using Windows, download binaries here). Generate private key: openssl genrsa 2048 > private.pem Generate the self signed certificate: openssl req -x509 -days 1000 -new -key private.pem -out public.pem If needed, create […]

5 min Security Management Identity Azure

Scenario:Before: VM1 code, config, user cred/connection to SQL1New: Azure keyvault for storing, but VM1 needs access to key vault, hm…better way? No keys? Kan we have zero secrets in the code?Azure Managed Identity System assigned management identity User assigned management identity System assigned management identity (1 to 1) VM1(source)->Identity->System assigned->enable SQL1 (target)-> IAM->Add role assignment-> […]

Cryptography with Python – Caesar Cipher

After reading (almost done) with: The Code Book : The Secret History of Codes and Code-Breaking Paperback – April 30, 2002by Simon Singh (Author) available at Amazon and so on I became fascinated with the history and the small stories that goes along with the different codes used and still being used today. Here is […]

Python for Cyber Security additional resources to learn

The Cyber Defenders Program: https://medium.com/cyberdefenders/search?q=python So the plan is to do the second and third resource first and then move to the next. The first one is a course so…. Second, skip the most of the basic, repeat some from automating the boring stuff: https://automatetheboringstuff.com/ Chapter 5 – Dictionaries and Structuring Data = checkChapter 10 […]