More summaries and tags

This commit is contained in:
2026-01-16 11:12:03 -05:00
parent 1191fd0af0
commit 0ea515752c
17 changed files with 154 additions and 8 deletions

View File

@@ -2,18 +2,17 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "README" title: "README"
date: 2019-08-01 date: 2019-08-01
tags:
- blog
- security
- notes
draft: false draft: false
summary: |
A quick intro to the personal securityresearch blog—where I mash together ministudies, and reading notes.
--- ---
## Security Blog ## Security Blog
This blog is various summaries of minor research, reading, and independant learning in regards to computer security. This blog is various summaries of minor research, reading, and independant learning in regards to computer security.
Mostly this blog is to satisfy the requiremnts for my Security+ certificate.
## Cert ID
Security+ ID: COMP001021281239
Exp Date: 04/04/2024

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Metaphors: Code Complete Summations" title: "Metaphors: Code Complete Summations"
date: 2023-11-13 date: 2023-11-13
tags:
- code-complete
- metaphors
- software-development
- security
- coding-practices
draft: false draft: false
summary: |
A lighthearted look at Steve McConnells “Code Complete” metaphors—Penmanship, Farming, and Oyster Farming—and how each style can make your code more or less secure. Think of Penmanship as scribbling a quick note (great for tiny scripts, terrible for big projects), Farming as planting seeds with a bit of watering (testing each piece, but still lacking a master plan), and Oyster Farming as building a sturdy oyster bed (design first, then grow securely). Spoiler: the oyster wins the security contest.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,17 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Pre-Requisites (Part I) Initial Design: Code Complete Summations" title: "Pre-Requisites (Part I) Initial Design: Code Complete Summations"
date: 2023-12-20 date: 2023-12-20
tags:
- pre-requisites
- insecure-design
- owasp-top-10
- security
- software-design
- planning
- requirements
draft: false draft: false
summary: |
A breezy, slightly tongueincheek look at why solid planning isnt just good housekeeping—its a frontline defense. We walk through OWASPs Insecure Design warning, compare personal versus missioncritical projects, and tease out iterative vs. sequential approaches, all with a sprinkle of humor to keep the security talk from feeling like a lecture.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,19 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Pre-Requisites (Part II) Initial Design: Code Complete Summations" title: "Pre-Requisites (Part II) Initial Design: Code Complete Summations"
date: 2023-12-26 date: 2023-12-26
tags:
- pre-requisites
- insecure-design
- owasp-top-10
- architecture
- communication-protocols
- data-design
- ui-separation
- errorlogging
- security
draft: false draft: false
summary: |
A lighthearted deepdive into architectural prerequisites—communication, class skeletons, data design, UI separation, and error/log handling. Think of it as laying a solid blueprint before the code construction crew arrives, because a wobbly foundation makes for a lot of latenight debugging (and security headaches).
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,19 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Pre-Requisites (Part III) Initial Design: Code Complete Summations" title: "Pre-Requisites (Part III) Initial Design: Code Complete Summations"
date: 2024-03-05 date: 2024-03-05
tags:
- pre-requisites
- insecure-design
- owasp-top-10
- resource-management
- databases
- threading
- file-handles
- error-processing
- security
draft: false draft: false
summary: |
A breezy look at the nittygritty of resource and error management—databases, threading, file handles, and errorhandling philosophies. Its the “dont forget to tighten the bolts” chapter, reminding us that unmanaged resources and sloppy error handling are the secret doors that attackers love to sneak through.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Variable Usage: Code Complete Summations" title: "Variable Usage: Code Complete Summations"
date: 2024-02-23 date: 2024-02-23
tags:
- variable-naming
- code-complete
- security
- best-practices
- software-development
draft: false draft: false
summary: |
A breezy look at why good variable names, sensible placement, proper initialization, and singlepurpose usage arent just tidy coding habits—theyre tiny security shields. Clear names like `sanitizedUserInput` keep bugs (and attackers) from slipping through the cracks, while keeping variables close to their use and initialized from the getgo reduces the chance of leaks, memory mishaps, and confusing code.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,17 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Exploring Enrollment over Secure Transport" title: "Exploring Enrollment over Secure Transport"
date: 2023-03-30 date: 2023-03-30
tags:
- est
- secure-transport
- certificate-pinning
- public-key
- tls
- authentication
- security
draft: false draft: false
summary: |
A lighthearted dive into RFC7030 (EST) as a smarter alternative to hardcoded, pinned certificates. By letting clients fetch fresh TLS certs via a publickeyauthenticated EST server, you dodge the nightly releasecycle nightmare, gain easy revocation, and keep the private key out of the binary—plus a dash of extra work for the user thats worth the security payoff.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,16 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Fast Flux Botnet Overview" title: "Fast Flux Botnet Overview"
date: 2019-09-26 date: 2019-09-26
tags:
- fast-flux
- botnet
- dns
- detection
- mitigation
- security
draft: false draft: false
summary: |
A breezy, tour of fastflux botnets, those sneaky DNS tricks that let malicious actors hop around like digital grasshoppers. Well peek at how dynamic DNS and roundrobin magic keep the bad guys commandandcontrol servers slippery, and glance at the catandmouse game of detection (TTL tricks, activity indexes, and the occasional semantic sleuthing). Spoiler: its a wild ride, but the good news is there are ways to shine a flashlight on the flux.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,16 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Pseudo Random Number generators" title: "Pseudo Random Number generators"
date: 2024-03-22 date: 2024-03-22
tags:
- prng
- randomness
- cryptography
- entropy
- hardware
- security
draft: false draft: false
summary: |
A lighthearted tour of the quirky ways we coax randomness out of lavalamps, Geiger counters, ambient noise, and goodold motherboard sensors, because good cryptography needs a little chaos (and a lot of fun).
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,16 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Random Algorithm Analysis" title: "Random Algorithm Analysis"
date: 2020-04-17 date: 2020-04-17
tags:
- random-algorithms
- analysis
- silence-on-the-wire
- security
- python
- randomness
draft: false draft: false
summary: |
A playful replay of Zalewskis “Silence on the Wire” experiment: plotting 3D scattergrams of various RNGs (Python, shuf, urandom, online services) to see if any have secretly upgraded their magic. Spoiler: they all look suspiciously alike.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "RSA Optimization" title: "RSA Optimization"
date: 2022-12-06 date: 2022-12-06
tags:
- rsa
- optimization
- instruction-set
- cryptography
- performance
draft: false draft: false
summary: |
A dive into a custom ISA for RSA: modularinstruction shortcuts, multiplysubtract tricks, and exponentiationbysquaring hacks that shave a few cycles off the dreaded bignumber math.
--- ---
## INTRODUCTION ## INTRODUCTION

View File

@@ -2,7 +2,16 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Concurrency: Summations of Secure Coding in C and C++" title: "Concurrency: Summations of Secure Coding in C and C++"
date: 2023-01-27 date: 2023-01-27
tags:
- concurrency
- mutex
- threading
- c
- cpp
- secure-coding
draft: false draft: false
summary: |
A lighthearted rant about why a plainold `mutex` is the hero of secure C/C++ concurrency, why `goto` is still secretly useful, and how to keep your locks short and your bugs shorter.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,16 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Concurrency: Summations of Secure Coding in C and C++" title: "Concurrency: Summations of Secure Coding in C and C++"
date: 2023-06-29 date: 2023-06-29
tags:
- file-io
- secure-coding
- c
- cpp
- permissions
- least-privilege
draft: false draft: false
summary: |
A breezy guide to keeping file operations safe: validate paths, lock down permissions, and never let a privileged process wander into a users temp folder.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,17 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Set to NULL After Free: Summations of Secure Coding in C and C++" title: "Set to NULL After Free: Summations of Secure Coding in C and C++"
date: 2022-08-17 date: 2022-08-17
tags:
- free-and-null
- secure-coding
- c
- cpp
- memory-management
- pointers
- security
draft: false draft: false
summary: |
A breezy, slightly tongueincheek look at why setting pointers to `NULL` right after `free` (and a few related memorymanagement niceties) can save you from nasty useafterfree bugs, memory leaks, and the occasional midnight debugging panic.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Always null Terminate (Part 2): Summations of Secure Coding in C and C++" title: "Always null Terminate (Part 2): Summations of Secure Coding in C and C++"
date: 2022-08-13 date: 2022-08-13
tags:
- string-concatenation
- null-termination
- c
- cpp
- secure-coding
draft: false draft: false
summary: |
The sequel to the nulltermination saga, now tackling `strcat`, `strncat`, `strlcat`, and friends—plus a quick table to keep your concatenations from turning into catastrophes.
--- ---
## Introduction ## Introduction
@@ -11,7 +19,7 @@ Series on summarizing themes in "Secure Coding in C and C++" by Robert C. Seacor
This is written for an audience that has a broad overview of security concepts. Not much time is spent explaining each concept, and I encourage everyone to read the book. This is written for an audience that has a broad overview of security concepts. Not much time is spent explaining each concept, and I encourage everyone to read the book.
The first theme to discuss is always `null` terminating `char *` or `char array` buffers (unless you have a *very* specific reason for not). This is very important to help prevent buffer overflows, reading arbitrary memory, accessing 'inaccessible' memory. This is part 2 where we will discuss string cat and length. For a brief discussion on string copy see [part 1](/posts/secure-coding-in-c-summations-null-terminate.md). The first theme to discuss is always `null` terminating `char *` or `char array` buffers (unless you have a *very* specific reason for not). This is very important to help prevent buffer overflows, reading arbitrary memory, accessing 'inaccessible' memory. This is part 2 where we will discuss string cat and length. For a brief discussion on string copy see [part 1](posts/secure-coding-in-c-summations-null-terminate.md).
## Functions Needing null ## Functions Needing null

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Always null Terminate: Summations of Secure Coding in C and C++" title: "Always null Terminate: Summations of Secure Coding in C and C++"
date: 2021-09-01 date: 2021-09-01
tags:
- null-termination
- strings
- c
- cpp
- secure-coding
draft: false draft: false
summary: |
A lighthearted reminder that every character buffer deserves a `'\0'`—otherwise youre inviting buffer overflows, stray reads, and a lot of debugging grief.
--- ---
## Introduction ## Introduction

View File

@@ -2,7 +2,15 @@
author: "Halvo (Human)" author: "Halvo (Human)"
title: "Stateless Detection of Malicious Traffic" title: "Stateless Detection of Malicious Traffic"
date: 2019-08-23 date: 2019-08-23
tags:
- stateless-detection
- network-security
- traffic-analysis
- ids
- machine-learning
draft: false draft: false
summary: |
A recap of my masters thesis that proves you can sniff out nasty traffic using only oneway packet metadata (TTL, ports, timing)—no payload inspection required.
--- ---
## Introduction ## Introduction