Security for API endpoint accessed by frontend users and 3rd party systemsTo select a correct method we should start with a threat modeling. At the beginning we focus on an interactive user, accessing API via…Oct 3Oct 3
Simple HTTP echo serverSometimes (for example debugging Istio) we need to see what’s received by the HTTP destination. We can achieve it with Python.Aug 20Aug 20
Squid MITM proxy with dynamic URL acceptanceIt’s not out of box experience, but still possible.Aug 16Aug 16
Feasibility study of hacking VMware ESXi 8Maybe you can get there but your malware won’t persist after reboot…Jun 17Jun 17
Malware in JSON documentsWhen developers decide to use JSON format to transfer files a standard Anti-Virus scanning of full JSON may not detect embedded malicious…Jan 20Jan 20
Anti-Virus REST APISometimes end to end you process content which needs AV scan, but you are on Kubernetes and don’t have easy way to persist content to disk…Dec 1, 2023Dec 1, 2023