jm33_ng
  • Cryptography
  • Ctf
  • Misc
  • Pentest
  • Programming
  • Tools
  • Vulnerabilities

jm33_ng


an infosec newbie's tech blog

Secure Your Email / 使用安全电邮

Date Sat 04 June 2016 Tags PGP / cryptography / email / censorship

Most users don't know how vulnerable their email service is, and how scary their government can be. Thus you need to know how to make it impossible for other people/organization to see your email, even make yourself invisible to them

If you/如果你

  • had nothing to hide/没什么要隐藏的

  • were …

View comments.

more ...

Using OCSERV On An HTTPS server

Date Thu 26 May 2016 Tags ocserv / apache / systemd / socket / https / 443

What happened

  • Using ocserv 0.11.1 on Debian Stretch
ocserv 0.11.1

Compiled with seccomp, tcp-wrappers, oath, gssapi, PAM, PKCS#11, AnyConnect, 
GnuTLS version: 3.4.12 (compiled with 3.4.10)
  • By default, ocserv creates ocserv.socket that listens on port 443, and you usually can't figure …

View comments.

more ...

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • »

About jm33

Who

  • ASU / weaponizer / linux user / vimer / pythonist / gopher / gray hat / male / siscon / freak

Contact

  • Online CV

  • 3A5DBF07

  • Leave a message

  • Social

    • Twitter
    • LinkedIn
    • StackOverflow
    • Github
  • Recent Posts

    • QQ Is Reading Your Browsing History
    • emp3r0r - Process Injection And Persistence
    • emp3r0r - Break Out Of Internal Network
    • Pure Memory Based Emp3r0r Agents
    • SSHD Injection and Password Harvesting
  • Tags

    • 443
    • active directory
    • ad
    • announcement
    • anonymity
    • antivirus
    • anyconnect
    • apache
    • assembly
    • baidu
    • blackhat
    • buffer overflow
    • C#
    • career
    • censorship
    • change
    • cisco
    • code maintainance
    • compton
    • Coursera
    • crypto
    • cryptography
    • ctf
    • CVE
    • CVE-2018-18955
    • CVE-2018-7750
    • dairy
    • Diary
    • DNS污染
    • DPI
    • email
    • emp3r0r
    • exploit
    • file transfer
    • gf
    • gfw
    • github
    • Glowing Bear
    • golang
    • google hacking
    • great wall
    • greatwall
    • hacking
    • hacking tool
    • HiWiFi
    • HTTP2
    • https
    • injection
    • IRC
    • 极路由
    • Joomla
    • KCP
    • kcptun
    • kernel
    • killer
    • lede
    • life
    • linux
    • linux kernel
    • lkm
    • local privilege escalation
    • log cleaner
    • login bypass
    • LPE
    • macos
    • mass exploit
    • mec
    • memory layout
    • mentohust
    • Misc
    • multi-threaded crawler
    • mysql
    • namespace
    • netcat
    • network
    • nic
    • nikto
    • nmap
    • obfs4
    • obfsproxy
    • ocserv
    • openwrt
    • OSIN
    • paramiko
    • pentest
    • pep8
    • PGP
    • php
    • pi
    • plan
    • port-forwarding
    • post-exploitation
    • privilege escalation
    • programming
    • project
    • proxy
    • ptrace
    • PTRACE_TRACEME
    • pythonic
    • QQ
    • quote
    • RCE
    • reverse shell
    • reversing
    • rootkit
    • router
    • s2-045
    • scanner
    • scramblesuit
    • SEED lab
    • shadowsocks
    • shadowsocks-plus
    • shellcode
    • skydog
    • smartphone
    • socket
    • sqli
    • sqlmap
    • SS
    • sshd
    • SSL
    • Stanford
    • sudo
    • systemd
    • Thomas Jefferson
    • TMUX
    • tools
    • Tor
    • trasparent proxy
    • vim
    • virtualbox
    • vpn
    • wayland
    • web
    • weechat
    • windows
    • windows domain
    • windows server
    • xfce4
    • xfwm
    • xhost
    • xml
    • xmpp
    • zoomeye

© 2021 jm33-ng - About this site

Creative Commons License Content licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where indicated otherwise.

Images hosted on this site are either my own or from Google Image Search