Jakub JóźwickiSecurity for API endpoint accessed by frontend users and 3rd party systemsTo select a correct method we should start with a threat modeling. At the beginning we focus on an interactive user, accessing API via…Oct 3Oct 3
Jakub JóźwickiSimple Linux stress testHow to verify the overhead of having AV on your serverAug 26Aug 26
Jakub JóźwickiSimple HTTP echo serverSometimes (for example debugging Istio) we need to see what’s received by the HTTP destination. We can achieve it with Python.Aug 20Aug 20
Jakub JóźwickiSquid MITM proxy with dynamic URL acceptanceIt’s not out of box experience, but still possible.Aug 16Aug 16
Jakub JóźwickiFeasibility study of hacking VMware ESXi 8Maybe you can get there but your malware won’t persist after reboot…Jun 17Jun 17
Jakub JóźwickiMalware in JSON documentsWhen developers decide to use JSON format to transfer files a standard Anti-Virus scanning of full JSON may not detect embedded malicious…Jan 20Jan 20
Jakub JóźwickiAnti-Virus REST APISometimes end to end you process content which needs AV scan, but you are on Kubernetes and don’t have easy way to persist content to disk…Dec 1, 2023Dec 1, 2023
Jakub JóźwickiHow to mount raw disk dump containing LVMIt might be a clone of Azure VM :)Oct 3, 2023Oct 3, 2023