How can you protect against a man-in-the-middle forging a TLS Client Hello that offers insecure algorithms?

According to PAN-OS documentation for "Traceability and Control of Post-Quantum Cryptography",

Traffic encrypted by PQC [post-quantum computing] or hybrid PQC algorithms cannot be decrypted yet, making these algorithms vulnerabl… Continue reading How can you protect against a man-in-the-middle forging a TLS Client Hello that offers insecure algorithms?

What optimization can be made for nanosecond IO and CPU stability when performing a timing attack?

I’m using Rust to create a program to attempt a timing attack on a network resource (a printer I lost a password to). I’m wired directly into it. What Linux environmental constraints can I optimize to minimize noise and variability?
Curren… Continue reading What optimization can be made for nanosecond IO and CPU stability when performing a timing attack?

Why is it safer to run as non-root inside a single-user container that is deployed with rootless podman?

According to the JellyFin documentation

Podman doesn’t require root access to run containers, although there are some details to be mindful of; see the relevant documentation. For security, the Jellyfin container should be run using rootl… Continue reading Why is it safer to run as non-root inside a single-user container that is deployed with rootless podman?

What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?

I’m evaluating running Chromium without native sandboxing in a rootless container. A few points:

You can containerize Chrome using rootless containers with something like podman. This will utilize kernel user-namespaces to isolate the Chr… Continue reading What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?

Where to get images with vulnerabilities to test penetration tooling? [closed]

I had a request by some people in the Linux Users Group to show off metasploit. This is a product I’ve used, but I’m by no means an expert on.
Is there anything like an open source repository of images I can run in a virtual machine or the… Continue reading Where to get images with vulnerabilities to test penetration tooling? [closed]