<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blog THAYOZ</title><link>https://blog.biscuit.ovh/</link><description>Recent content on Blog THAYOZ</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 25 Dec 2025 15:03:10 +0100</lastBuildDate><atom:link href="https://blog.biscuit.ovh/index.xml" rel="self" type="application/rss+xml"/><item><title>Email Security</title><link>https://blog.biscuit.ovh/posts/05_email-security/</link><pubDate>Thu, 25 Dec 2025 15:03:10 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/05_email-security/</guid><description>&lt;h2 id="ensuring-proper-email-security-a-deep-dive-into-spf-dkim-dmarc-and-spf-flattening"&gt;Ensuring Proper Email Security: A Deep Dive into SPF, DKIM, DMARC, and SPF Flattening&lt;/h2&gt; &lt;p&gt;Email remains a critical communication tool for businesses and individuals alike. However, it&amp;rsquo;s also a prime target for cybercriminals who exploit vulnerabilities through phishing, spoofing, and impersonation attacks. To combat these threats, implementing robust email authentication protocols is essential. This blog post provides a comprehensive, detailed guide to setting up Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC).
We&amp;rsquo;ll also include a dedicated subchapter on SPF flattening—a technique to optimize SPF records when they become overly complex. Each section includes step-by-step instructions, code examples, and best practices to help you secure your domain effectively..&lt;/p&gt;</description></item><item><title>LLM+MCP+Kali-Linux = Pentesting</title><link>https://blog.biscuit.ovh/posts/04_llm-pentesting/</link><pubDate>Fri, 10 Oct 2025 23:13:30 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/04_llm-pentesting/</guid><description>&lt;p&gt;By integrating a local large language model (LLM) like Ollama running Mistral with the Model Context Protocol (MCP), we can connect to an MCP server that interfaces with a Dockerized Kali Linux instance. This setup allows the AI to execute penetration testing commands in a controlled environment, aiding in tasks like vulnerability scanning and CTF challenges.s&lt;/p&gt;
&lt;h2 id="what-is-mcp-and-why-use-it-for-pen-testing"&gt;What is MCP and Why Use It for Pen Testing?&lt;/h2&gt; &lt;p&gt;The Model Context Protocol (MCP) is an open standard for connecting AI models to external tools and data sources. It acts as a bridge, enabling LLMs to interact with systems securely. In penetration testing, MCP servers can expose tools like those in Kali Linux, allowing AI to assist in ethical hacking tasks without direct human intervention for every command.&lt;/p&gt;</description></item><item><title>Hiring with a CTF Challenge</title><link>https://blog.biscuit.ovh/posts/03_ctf-as-hiring/</link><pubDate>Wed, 20 Aug 2025 22:03:10 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/03_ctf-as-hiring/</guid><description>&lt;p&gt;In the ever-evolving landscape of cybersecurity, finding and hiring skilled security engineers has become one of the most complex tasks for organizations. With cyber threats growing in sophistication and frequency, companies need professionals who aren&amp;rsquo;t just book-smart but passionate and curious about many things. Traditional recruitment methods: resumes, interviews, study cases often fall short in identifying true talent. Enter the Capture The Flag (CTF) challenge: a gamified, hands-on approach that&amp;rsquo;s transforming how we scout for infosec wizards. In this blog post, we&amp;rsquo;ll dive deep into why recruiting security engineers is so tricky, how an online CTF with eight targeted challenges can serve as the ultimate first barrier, and practical insights on implementing this strategy to build a good security team.&lt;/p&gt;</description></item><item><title>NotPetya</title><link>https://blog.biscuit.ovh/posts/02_mistakes-were-made-copy/</link><pubDate>Sun, 20 Apr 2025 07:31:01 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/02_mistakes-were-made-copy/</guid><description>&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/3-MSlNVqzYY?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"&gt;&lt;/iframe&gt;
 &lt;/div&gt;</description></item><item><title>Mistakes Were Made</title><link>https://blog.biscuit.ovh/posts/02_mistakes-were-made/</link><pubDate>Thu, 15 Aug 2024 21:23:01 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/02_mistakes-were-made/</guid><description>&lt;p&gt;&lt;a href="https://www.youtube.com/@ModernVintageGamer" target="_blank" rel="noopener"&gt;Modern Vintage Gamer&lt;/a&gt; masterfully chronicles the epic history of how hackers systematically defeated the security protections of the original Xbox, Xbox 360, Sony PS1, PS2, PS3, PS4, Vita, PSP (plus GameCube, Wii, and Saturn). This while leveraging hardware modchips, swap tricks to kernel exploits and beyond.&lt;/p&gt;
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;"&gt;
 &lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share; fullscreen" loading="eager" referrerpolicy="strict-origin-when-cross-origin" src="https://www.youtube.com/embed/8iEb266ZfWQ?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" title="YouTube video"&gt;&lt;/iframe&gt;
 &lt;/div&gt;</description></item><item><title>IoT Everything</title><link>https://blog.biscuit.ovh/posts/01_iot-really/</link><pubDate>Mon, 22 Jan 2024 22:03:10 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/01_iot-really/</guid><description>&lt;p&gt;In the era of smart kitchens, WiFi-connected air fryers promise ultimate convenience: preheat your device from the office, monitor cooking progress via an app, or even integrate it with voice assistants like Alexa. Brands like Cosori, Xiaomi, and Aigostar offer models that let you control temperatures and timers remotely, turning a simple appliance into a &amp;ldquo;smart&amp;rdquo; hub.
But from an information security standpoint, these devices introduce significant risks. While the convenience is tempting, connecting a high-heat appliance to your home network—and often the internet—opens doors to vulnerabilities that could compromise your privacy, network security, or even physical safety.&lt;/p&gt;</description></item><item><title>Time to start something</title><link>https://blog.biscuit.ovh/posts/00_start/</link><pubDate>Sun, 19 Nov 2023 20:03:10 +0100</pubDate><guid>https://blog.biscuit.ovh/posts/00_start/</guid><description>&lt;p&gt;Hey! After years of jotting down ideas in scattered notes, vscode pages, and random files, I&amp;rsquo;ve decided to create a proper home for them: this public scratchpad.
I work with tech daily—building, breaking, and exploring how things connect. My interests shift constantly: IoT projects and embedded systems one day, IT security, vulnerabilities, and threat modeling the next.
This blog will capture it all:&lt;/p&gt;
&lt;p&gt;Notes on IoT tinkering
Thoughts on security topics, tools, and best practices
Technical deep dives
Half-baked ideas and random discoveries
Quick gotchas or &amp;ldquo;wish I&amp;rsquo;d known this&amp;rdquo; moments&lt;/p&gt;</description></item><item><title/><link>https://blog.biscuit.ovh/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://blog.biscuit.ovh/about/</guid><description>&lt;h1 id="about"&gt;About&lt;/h1&gt; &lt;p&gt;I&amp;rsquo;m a &lt;strong&gt;curious human&lt;/strong&gt; currently based in &lt;strong&gt;Switzerland&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;By day I manage cybersecurity, and in my spare time I love diving deep into iot, IT for kids.&lt;/p&gt;
&lt;h3 id="what-gets-me-excited-right-now"&gt;What gets me excited right now&lt;/h3&gt; &lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cybersecurity&lt;/strong&gt; — Protecting people, organizations, and infrastructure from evolving threats is what I do every day — and what keeps me up at night (in a good way). Whether it&amp;rsquo;s hunting for vulnerabilities, hardening environments, analyzing incidents, or building secure-by-design systems, I love the cat-and-mouse game of modern security. There is no routine and every day is a new challenge.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technology in General&lt;/strong&gt; — Especially the Bleeding Edge
I&amp;rsquo;m endlessly curious about where tech is heading. Right now, large language models (LLMs) and the rapid wave of AI novelties have me hooked. The pace of change is insane — and I want to understand (and maybe even help shape) what&amp;rsquo;s coming next.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IoT and Embedded Systems&lt;/strong&gt; — There&amp;rsquo;s something magical about making physical things smart. I tinker with microcontrollers, sensors and small embedded systems. From building custom home-automation gadgets to thinking about how to automate time consuming daily choires.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This blog is my corner of the internet where I share what I&amp;rsquo;m learning, building, and thinking about. Expect posts about mainy things — sometimes serious, often not.&lt;/p&gt;</description></item></channel></rss>