Security for API endpoint accessed by frontend users and 3rd party systemsTo select a correct method we should start with a threat modeling. At the beginning we focus on an interactive user, accessing API via…Oct 3, 2024Oct 3, 2024
Simple Linux stress testHow to verify the overhead of having AV on your serverAug 26, 2024Aug 26, 2024
Simple HTTP echo serverSometimes (for example debugging Istio) we need to see what’s received by the HTTP destination. We can achieve it with Python.Aug 20, 2024Aug 20, 2024
Squid MITM proxy with dynamic URL acceptanceIt’s not out of box experience, but still possible.Aug 16, 2024Aug 16, 2024
Feasibility study of hacking VMware ESXi 8Maybe you can get there but your malware won’t persist after reboot…Jun 17, 2024Jun 17, 2024
Malware in JSON documentsWhen developers decide to use JSON format to transfer files a standard Anti-Virus scanning of full JSON may not detect embedded malicious…Jan 20, 2024Jan 20, 2024
Anti-Virus REST APISometimes end to end you process content which needs AV scan, but you are on Kubernetes and don’t have easy way to persist content to disk…Dec 1, 2023Dec 1, 2023