OWASP Top Ten

The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.

<span title='2020-10-13 00:00:00 +0000 UTC'>October 13, 2020</span>&nbsp;·&nbsp;7 min&nbsp;·&nbsp;David Xiao

Diffie-Hellman Key Exchange in a Nutshell

DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.

<span title='2020-10-12 00:00:00 +0000 UTC'>October 12, 2020</span>&nbsp;·&nbsp;1 min&nbsp;·&nbsp;David Xiao

Sign Client Certificate Using Self Signed CA Certificate

In a cluster setting where TLS mutual authentication is required, it’s not uncommon to see client certificates signed by either self-signed root CA or private CA.

<span title='2020-10-10 00:00:00 +0000 UTC'>October 10, 2020</span>&nbsp;·&nbsp;4 min&nbsp;·&nbsp;David Xiao

Python3 CheatSheet

This post is my collection of python3 code snippets including string and list manipulation.

<span title='2020-10-02 00:00:00 +0000 UTC'>October 2, 2020</span>&nbsp;·&nbsp;7 min&nbsp;·&nbsp;David Xiao

Audit User Actions Using CloudTrail - Part 2

This is the second post of a series that demonstrates how to leverage AWS CloudTrail in auditing user actions. This post is focused on cross account access.

<span title='2020-09-17 23:53:30 -0400 -0400'>September 17, 2020</span>&nbsp;·&nbsp;3 min&nbsp;·&nbsp;David Xiao