Security Sprint: Week 6 - Perl, forensic and new limits

Again my weekly security sprints arrives in late, but I hope not too late as this time, I’m experimenting with dangerous new horizons, such as Perl and Forensics. I approached to Perl with respect and, yes why not saying it, fear. First of all everyone, except my cloud computing teacher, warned me about the complexity of this language. Anyway I tried to made it the easy way, and searched for help in an already prepared script for security I found on GitHub. The script is quite clear and organized which helped me to both learn perl and...

Security Sprint: Week 5 - Network Capture Probe with Raspberry

Recently something amazing was added in my university’s library: you can ask not only for for books but also for electronic programming bundles such as Raspberry or Arduino kits. I decided to take a Raspberry Pi kit in order to make an experiment: a network capture probe.

A network capture probe is a tool for network system monitoring that allows you to capture traffic in real-time. I learned about this technique not long ago when I met a guy who was wearing one of those in his bag everywhere using his Raspberry...

Security Sprint: Week 4 - CA pairs creation with openssl

I found a nice topic to write about: CA pairs creation with openssl in Linux. A digital certificate tells an application (a browser, for example) that a public key is owned by the one who calls it. This allows relying parties to rely upon signatures made to this public key. OpenSSL is a free and open-source cryptographic library that provides several command-line tools for handling digital certificates. So, for now we are working on root so first of all I suggest to sudo -i and then do the rest.

In this case we are working on a directory...

Distributed Ledger and ethereum token creation

Basically, distributed ledger is the concept of sharing data evolution control in a common network. One of the most famous examples of this are BITCOINS, which works over a blockchain, a data base distributed between several participants (nodes) inside a ledger, which contains the updated status of each transaction between the nodes. These nodes are connected using a specific protocol.

The key of this system’s movement lays on Token, elements that contains information and are encrypted. This token could act as a currency, vote, message, or anything that can be fixed in Distributed Ledger system. Several startups saw in this...

ネットワークの監視

ネットワークの監視の学過ぎ問題の保証見つける だろう。ネットワークの監視はあまり難しくないです。あなたはLINUXとBRO要ろう。

BROはコマンドラインインターフェイスでそ。あなたのオペレーションシステムはLINUXですなら、ここにダウンロードください

[…/bro/bin]にsudo[./broctl]実行ください。

あなたはこれ見えるすべき

Welcome to BroControl 1.7

Type "help" for help.

[BroControl] >


それはBROのインタフェースです。[start]書こうなら、[…/bro/logs]助けるます。[…/bro/logs]はネットワークの情報持つです! たとえば、[x509.log]は証明証もつです。あなたは止ま行きたいなら、[BroControl]に[stop]書いてください。

Also in Hatena, similar post in English here.

Originally written in: https://dev.to/terceranexus6/-1jj