I found a nice topic to write about: CA pairs creation with openssl in Linux. A digital certificate tells an application (a browser, for example) that a public key is owned by the one who calls it. This allows relying parties to rely upon signatures made to this public key. OpenSSL is a free and open-source cryptographic library that provides several command-line tools for handling digital certificates. So, for now we are working on root so first of all I suggest to sudo -i and then do the rest.

In this case we are working on...


Basically, distributed ledger is the concept of sharing data evolution control in a common network. One of the most famous examples of this are BITCOINS, which works over a blockchain, a data base distributed between several participants (nodes) inside a ledger, which contains the updated status of each transaction between the nodes. These nodes are connected using a specific protocol.

The key of this system’s movement lays on Token, elements that contains information and are encrypted. This token could act as a currency, vote, message, or anything that can be fixed in Distributed Ledger system. Several startups saw in this...


ネットワークの監視の学過ぎ問題の保証見つける だろう。ネットワークの監視はあまり難しくないです。あなたはLINUXとBRO要ろう。





Welcome to BroControl 1.7

Type "help" for help.

[BroControl] >

それはBROのインタフェースです。[start]書こうなら、[…/bro/logs]助けるます。[…/bro/logs]はネットワークの情報持つです! たとえば、[x509.log]は証明証もつです。あなたは止ま行きたいなら、[BroControl]に[stop]書いてください。

Also in Hatena, similar post in English here.

Originally written in: https://dev.to/terceranexus6/-1jj


Friday was such an intense day regarding to security. First of all I started investigating for a class assignment about Distributed Ledger (as in Bitcoin system) applied to other things such as energy industry, communication and similar. A distributed ledger is a database held and updated independently by each participant (or node) in a large network. The lacking of central authority makes individual nodes process every transaction, and update the ledger again (for every node).

I found this deeply interesting and started investigating about Ethereum as its documentation provides a...


As my second week in my security intensive study a huge opportunity appeared in my life! Casually, I’ve been asked to guide a group of students into Network monitoring and Forensic, which is already my favourite security module. I wanted to study in a wider range, as I already said in week one, but right now I should put most of my efforts in the group goals, also I’m excited with the opportunity of learning from these guys.

Anyway, I’d like to start this article with a brief explanation on “where to sniff”, where in a network should we...