Yarelys Riveracyberyara.com·Nov 4, 2024How Secure Web Traffic Happens: Step-by-Step GuideWe've all experienced that sense of relief when we see the lock icon or “your connection is secure”. But have you ever wondered what's happening behind the scenes to make that possible? Secure web traffic is essential for protecting sensitive data tr...DiscussSecure Web Traffic
Jan Tymińskitymik.me·Oct 2, 2024Is it possible to use a custom certificate issued by a private certificate authority with custom origin behind CloudFront?One day an engineer in my team came up with this question. There was no quick answer available, so I started digging and here's what I found. CloudFront's docs on CNAMEs and HTTPS requirements say: CloudFront supports all types of certificates issue...DiscussAWS
pointedsecpointedsec.hashnode.dev·Jul 6, 2024Authority | HackTheBoxIntroducción Authority es una máquina de dificultad media de HackTheBox basada en Windows. En esta máquina se tocan conceptos de enumeración del protocolo SMB, donde encontraremos playbooks de Ansible, en estos playbooks se contiene "vaults" encripta...Discuss·26 readsESC1
Sai Keerthan Kasulakeerthankasula.hashnode.dev·May 5, 2024Part 3 : The public key infrastructure and certificate managementWith respect to my previous articles, I explained how encryption and decryption are performed, including the elements used for the hybrid encryption. As we know, we use two keys for asymmetric encryption: a public key and a private key. The term "pub...Discuss·30 readsCertificate Exchange
Murtaza Udaipurwalablog.murtazau.xyz·Feb 24, 2024A Practical Guide to Self-Signed X.509 Certificates Using OpenSSLCertificate Authority (CA) The CA serves as the root authority. All certificates generated for different services will be signed by it. Let's create our CA first. mkdir ca openssl req \ -x509 \ -newkey rsa:4096 \ -days 365 \ -nodes \...Discuss·308 readsopenssl