Posts


Dec. 25, 2025

Email Security

Ensuring Proper Email Security: A Deep Dive into SPF, DKIM, DMARC, and SPF Flattening

Email remains a critical communication tool for businesses and individuals alike. However, it’s also a prime target for cybercriminals who exploit vulnerabilities through phishing, spoofing, and impersonation attacks. To combat these threats, implementing robust email authentication protocols is essential. This blog post provides a comprehensive, detailed guide to setting up Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC). We’ll also include a dedicated subchapter on SPF flattening—a technique to optimize SPF records when they become overly complex. Each section includes step-by-step instructions, code examples, and best practices to help you secure your domain effectively..

Oct. 10, 2025

LLM+MCP+Kali-Linux = Pentesting

By integrating a local large language model (LLM) like Ollama running Mistral with the Model Context Protocol (MCP), we can connect to an MCP server that interfaces with a Dockerized Kali Linux instance. This setup allows the AI to execute penetration testing commands in a controlled environment, aiding in tasks like vulnerability scanning and CTF challenges.s

What is MCP and Why Use It for Pen Testing?

The Model Context Protocol (MCP) is an open standard for connecting AI models to external tools and data sources. It acts as a bridge, enabling LLMs to interact with systems securely. In penetration testing, MCP servers can expose tools like those in Kali Linux, allowing AI to assist in ethical hacking tasks without direct human intervention for every command.

Aug. 20, 2025

Hiring with a CTF Challenge

In the ever-evolving landscape of cybersecurity, finding and hiring skilled security engineers has become one of the most complex tasks for organizations. With cyber threats growing in sophistication and frequency, companies need professionals who aren’t just book-smart but passionate and curious about many things. Traditional recruitment methods: resumes, interviews, study cases often fall short in identifying true talent. Enter the Capture The Flag (CTF) challenge: a gamified, hands-on approach that’s transforming how we scout for infosec wizards. In this blog post, we’ll dive deep into why recruiting security engineers is so tricky, how an online CTF with eight targeted challenges can serve as the ultimate first barrier, and practical insights on implementing this strategy to build a good security team.

Apr. 20, 2025

NotPetya

Aug. 15, 2024

Mistakes Were Made

Modern Vintage Gamer masterfully chronicles the epic history of how hackers systematically defeated the security protections of the original Xbox, Xbox 360, Sony PS1, PS2, PS3, PS4, Vita, PSP (plus GameCube, Wii, and Saturn). This while leveraging hardware modchips, swap tricks to kernel exploits and beyond.

Jan. 22, 2024

IoT Everything

In the era of smart kitchens, WiFi-connected air fryers promise ultimate convenience: preheat your device from the office, monitor cooking progress via an app, or even integrate it with voice assistants like Alexa. Brands like Cosori, Xiaomi, and Aigostar offer models that let you control temperatures and timers remotely, turning a simple appliance into a “smart” hub. But from an information security standpoint, these devices introduce significant risks. While the convenience is tempting, connecting a high-heat appliance to your home network—and often the internet—opens doors to vulnerabilities that could compromise your privacy, network security, or even physical safety.

Nov. 19, 2023

Time to start something

Hey! After years of jotting down ideas in scattered notes, vscode pages, and random files, I’ve decided to create a proper home for them: this public scratchpad. I work with tech daily—building, breaking, and exploring how things connect. My interests shift constantly: IoT projects and embedded systems one day, IT security, vulnerabilities, and threat modeling the next. This blog will capture it all:

Notes on IoT tinkering Thoughts on security topics, tools, and best practices Technical deep dives Half-baked ideas and random discoveries Quick gotchas or “wish I’d known this” moments