Posts
OWASP Top Ten
The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.
read more
Posts
Diffie-Hellman Key Exchange in a Nutshell
DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.
read more
Posts
Sign Client Certificate Using Self Signed CA Certificate
In a cluster setting where TLS mutual authentication is required, it’s not uncommon to see client certificates signed by either self-signed root CA or private CA.
read more
Posts
Python3 CheatSheet
This post is my collection of python3 code snippets including string and list manipulation.
read more
Posts
Audit User Actions Using CloudTrail - Part 2
This is the second post of a series that demonstrates how to leverage AWS CloudTrail in auditing user actions. This post is focused on cross account access.
read more