More and more web-traffic is moving to https instead of http protocol. Because users are using a modern browser that defaults to https or a browser extension like Https-By-Default . A great development from a security- and privacy perspective. But with some side effects as it pointed out that the redirect service offered by our hosting provider does not fully support https which causes a security warning.
Although valid commercial solutions are available this fully triggered my (somewhat rusty) not invented here syndrome. Performing the redirect sounds like a suitable functionality for a simple cloud function. With the additional requirement that it should be able to host the cloud function on the (sub)domain(s) we want to use for our redirects.
This blog post will describe the simple steps to develop a cloud function using Firebase Functions and expose it through Firebase Hosting over https using a valid certificate.
Continue reading →
Welcome back to the blog series about how to hack a box! In the first blog I gave an introduction into the steps and prerequisites on How to hack a box.
In this second post I’ll guide you through the first step, which is exploration.
We will execute the steps on an actual box in Hack The Box, called Blocky.
|
DISCLAIMER: Never attempt to execute one of these steps on a machine where you don’t have explicit permission for from the owner.
This is illegal and will get you in trouble.
|
Continue reading →
Welcome to the blog series about how to hack a box! In this first post I’ll guide you through the global steps you can take to hack a box.
The steps are universal, so you can use them on any target which you have permission for.
In the next few posts we’ll go through each step in detail and try to hack a box in Hack The Box, called Blocky.
Continue reading →
As developer, you probably have to work with APIs.
Either you consume them, or perhaps you build them.
Most of the time an API provides some sort of JSON response or perhaps XML.
When the implementation is complete, it provides documentation as well, using the OpenAPI specification.
This however is not what this blog is about.
The goal is to get you started exploring OData.
OData is an OASIS Standard that defines the best practice for creating and using RESTful APIs.
So in short, it is a web-based protocol for querying and updating data.
Continue reading →