<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 05:23:28 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@security101/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[[DE]Penetration Testing Theorie #4]]></title><description><![CDATA[In dieser kleinen Serie möchte ich eine kurze Einleitung zur theoretischen Vorgehensweise von Penetrationstests geben. Aufgeteilt ist diese Serie in folgende Beiträge: #1 Was ist Penetrationtesting,]]></description><link>http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-4</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-4</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 22 Oct 2018 21:40:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP9bhaoWjYHYzFRM8aYcKcs3fvcevDrAeFx18rHpDKGvxtg6FPgRwvrMjL1fJjf9tz9WH7LNNfY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE]Penetration Testing Theorie #3]]></title><description><![CDATA[In dieser kleinen Serie möchte ich eine kurze Einleitung zur theoretischen Vorgehensweise von Penetrationstests geben. Aufgeteilt ist diese Serie in folgende Beiträge: #1 Was ist Penetrationtesting,]]></description><link>http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-3</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-3</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Fri, 17 Aug 2018 19:51:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQC8o7tKYqP4Ew3QRvEEiCSyWs5kXVNJi4Pn3jkzo1bm8rxPy8714aBZxXPNU48XMfQMvP3gVw4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE]Penetration Testing Theorie #2]]></title><description><![CDATA[In dieser kleinen Serie möchte ich eine kurze Einleitung zur theoretischen Vorgehensweise von Penetrationstests geben. Aufgeteilt ist diese Serie in folgende Beiträge: #1 Was ist Penetrationtesting,]]></description><link>http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-2</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-2</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Tue, 22 May 2018 18:01:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZyibVp4U5Q5e7wxqVyH4pvLLaDBAUPpzxBan8danfRx31itzTt4i7DzLNS2wtNrTsqBvPzDVcS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Theoretically Penetrationtesting #1]]></title><description><![CDATA[In this small series I would like to give a short introduction to the theoretical procedure of penetration tests. This series is divided into the following contributions: #1 What is penetration testing,]]></description><link>http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</link><guid isPermaLink="true">http://direct.ecency.com/penetrationtesting/@security101/en-theoretically-penetrationtesting-1</guid><category><![CDATA[penetrationtesting]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 21 May 2018 09:07:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChP5jf4TfSrJdhvxYgMExB7mCA52nz8G2JsViugML1KTvg5JQadM5EFwLPcpqnVdtgxadHwFndNW75he6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Penetration Testing Theorie #1]]></title><description><![CDATA[In dieser kleinen Serie möchte ich eine kurze Einleitung zur theoretischen Vorgehensweise von Penetrationstests geben. Aufgeteilt ist diese Serie in folgende Beiträge: #1 Was ist Penetrationtesting,]]></description><link>http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-1</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-penetration-testing-theorie-1</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 14 May 2018 19:40:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVZ5NRzV2o8MyJEzowAL6rjbt8w3dTGU7kXRtR68np8UcnVkVM5AKDRYNXd7z1PuX19qgf4mkJ7NwSgCe2EDx7WsfkfVqT5J5Y2qJtT2XVRzSfK9kLn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Linux file permissions - SUID]]></title><description><![CDATA[File permissions are a basic concept in Linux systems to manage permissions to write, read and execute files. In this article I would like to limit myself to a less common file right - the SUID-bit. By]]></description><link>http://direct.ecency.com/it-security/@security101/en-linux-file-permissions-suid</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@security101/en-linux-file-permissions-suid</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 05 May 2018 15:08:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc18GVREvvsnAjfLwLF5qHHFduNHKinq1Rex8do7kaNZD1Qb984ch3y6ESiMiqito5D9d815EWNQN8SfLD9EoSbfdZnPRk9uf1bfdTKhQGBya57mWZL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE/EN] MyEtherWallet DNS Servers hijacked]]></title><description><![CDATA[Deutsch Aus aktuellem Anlass nur ganz kurz: Einige DNS-Server lösen auf falsche IP-Adressen von MyEtherWallet.com auf. DNS steht für Domain Name System und löst Domainnamen in entsprechende IP-Adressen]]></description><link>http://direct.ecency.com/myetherwallet/@security101/de-en-myetherwallet-dns-servers-hijacked</link><guid isPermaLink="true">http://direct.ecency.com/myetherwallet/@security101/de-en-myetherwallet-dns-servers-hijacked</guid><category><![CDATA[myetherwallet]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Tue, 24 Apr 2018 15:21:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g774G2LPx8CTVHrbGQ778Sw45DBMcdCnLC9hLzMmTxjLNkYmxZbd8nkdEaYXgWDaYqGEVAisjbPonyNRSgn9f1iXX1wG1LUDec337eVfBT6d4jcPVQ2v1Mi1vFiAfF1Ym2QdQ4UqC2uaJtXoqjYS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Linux Dateirechte - SUID]]></title><description><![CDATA[Dateirechte sind in Linux Systemen ein grundlegendes Konzept mit dem Schreib-, und Leserechte sowie das Ausführen von Dateien verwaltet werden. In diesem Beitrag möchte ich mich auf ein nicht ganz so]]></description><link>http://direct.ecency.com/deutsch/@security101/de-linux-dateirechte-suid</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-linux-dateirechte-suid</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sun, 22 Apr 2018 13:47:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChSi769XJPriUDq3gbQLLhNzPaqEK37wL9oeUgMpQ29hYJ9yARx4zRofSEGaiorPTRG2r1NwUTJa9N3VY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Bufferoverflow - Praxisbeispiel]]></title><description><![CDATA[Vorallem eingebettete Systeme nutzen oftmals Hardwarenahe Programmiersprachen und sind damit anfällig für Buffer-Overflows. Nachdem ich in einem vorherigen Beitrag die theoretische Funktionsweise beschrieben]]></description><link>http://direct.ecency.com/deutsch/@security101/de-bufferoverflow-praxisbeispiel</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-bufferoverflow-praxisbeispiel</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 21 Apr 2018 08:50:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChTEiKcTvLY635pTB7EcbTvF8Q8bnFBfqaUfhEXMQRvbd2iUsy2nR9PeHTWxuTAnJoCAKT7RvgjwQ1iwx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[exploiting firmware binarys using a bufferoverflow - a practical tutorial]]></title><description><![CDATA[What Will I Learn? You will learn : How to extract a filesystem of a firmware How to run binarys for another architecture using qemu How a bufferoverflow works on a simple example Requirements Basic]]></description><link>http://direct.ecency.com/utopian-io/@security101/exploiting-firmware-binarys-using-a-bufferoverflow-a-practical-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@security101/exploiting-firmware-binarys-using-a-bufferoverflow-a-practical-tutorial</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sun, 08 Apr 2018 15:14:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGie4vHNtJmEbjhBiujkuP8gtLnQR93K4yrVhYAHRcKCzJwzmTvXdBtzkDMFsCYaT6imULNwra63tM29nybUC1TwUuZrA74jh3btUXQq3Bc2skK8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Understanding Cross-Site Scripting (XSS) attacks]]></title><description><![CDATA[Cross-Site-Scripting (XSS) is a vulnerability in web applications that makes it possible to execute malicious code (mostly JavaScript). This is often possible through user input fields, in which the entries]]></description><link>http://direct.ecency.com/webdev/@security101/en-understanding-cross-site-scripting-xss-attacks</link><guid isPermaLink="true">http://direct.ecency.com/webdev/@security101/en-understanding-cross-site-scripting-xss-attacks</guid><category><![CDATA[webdev]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 07 Apr 2018 09:08:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/7DceLgR4szFyHjpUoqzQB6Vh5UEaavnEyvwraEWNNwqpbfE5jXL4VjfyT3ta8rZn8WNL6FDwp9QMECb6tASrJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Cross-Site-Scripting (XSS) Angriffe verstehen]]></title><description><![CDATA[Unter Cross-Site-Scripting (XSS) versteht man eine Schwachstelle in Webanwendungen, durch die es möglich ist Schadcode (meistens JavaScript) auszuführen. Oftmals ist dies durch Felder für Nutzereingaben]]></description><link>http://direct.ecency.com/deutsch/@security101/de-cross-site-scripting-xss-angriff-verstehen</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-cross-site-scripting-xss-angriff-verstehen</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 31 Mar 2018 18:01:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/7DceLgR4szFyHjpUoqzQB6Vh5UEaavnEyvwraEWNNwqpbfE5jXL4VjfyT3ta8rZn8WNL6FDwp9QMECb6tASrJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Bufferoverflow - Theoretical part]]></title><description><![CDATA[In a buffer overflow or buffer overflow, data that is often read in as user input is written to a memory area that was not intended for this purpose. As larger amounts of data are read in than actually]]></description><link>http://direct.ecency.com/it-security/@security101/en-bufferoverflow-theoretical-part</link><guid isPermaLink="true">http://direct.ecency.com/it-security/@security101/en-bufferoverflow-theoretical-part</guid><category><![CDATA[it-security]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 31 Mar 2018 10:02:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g774G2LPx8CTVHrbGQ778Sw45DBMcdCnbFSqd3szfuHce28nDod2iDVLASvAdUXoH7tYHCDWGrbs9ths5Dcq9XExw1yGzzgDb5MxKiuHNdtMcNUMsBPBLX6v43WdZg1zKuz5tBvR3DN6J6Pd3DfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Bufferoverflow - Die Theorie]]></title><description><![CDATA[Bei einem Bufferoverflow oder Pufferüberlauf werden Daten, die oftmals als Benutzereingaben eingelesen werden, in einen Speicherbereich geschrieben, der nicht dafür gedacht war. Indem größere Datenmengen]]></description><link>http://direct.ecency.com/deutsch/@security101/de-bufferoverflow-die-theorie</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-bufferoverflow-die-theorie</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Wed, 28 Mar 2018 16:21:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/W5LtFUPm6g774G2LPx8CTVHrbGQ778Sw45DBMcdCnbFSqd3szfuHce28nDod2iDVLASvAdUXoH7tYHCDWGrbs9ths5Dcq9XExw1yGzzgDb5MxKiuHNdtMcNUMsBPBLX6v43WdZg1zKuz5tBvR3DN6J6Pd3DfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Rootkit Hunter - Checking Linux for Rootkits]]></title><description><![CDATA[In this article I would like to introduce the tool rkhunter(Rootkit Hunter). This software makes it easy to scan your system for known / conspicuous rootkits. Rkhunter is by no means the only tool. Another]]></description><link>http://direct.ecency.com/linux/@security101/en-rootkit-hunter-checking-linux-for-rootkits</link><guid isPermaLink="true">http://direct.ecency.com/linux/@security101/en-rootkit-hunter-checking-linux-for-rootkits</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Fri, 23 Mar 2018 21:02:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiGGuVCdw5BznswZJiQ34J8Sqp7FZv6q2aqYbLJg1Ai9mVFBdubvv1PEGqyPtRhqB3NLStvwG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Rootkit Hunter - Linux auf Rootkits untersuchen]]></title><description><![CDATA[In diesem Beitrag möchte ich euch das Tool rkhunter(Rootkit Hunter) vorstellen. Diese Software ermöglicht es das eigene System leicht nach bekannten / auffälligen Rootkits zu scannen. Rkhunter ist bei]]></description><link>http://direct.ecency.com/deutsch/@security101/de-rootkit-hunter-linux-auf-rootkits-untersuchen</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-rootkit-hunter-linux-auf-rootkits-untersuchen</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sun, 11 Mar 2018 09:57:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiGGuVCdw5BznswZJiQ34J8Sqp7FZv6q2aqYbLJg1Ai9mVFBdubvv1PEGqyPtRhqB3NLStvwG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] Shodan - A slightly different search engine]]></title><description><![CDATA[In the course of digitalization, more and more devices are being connected to the Internet. In the following I would like to introduce a search engine. It is not my aim to go into detail about individual]]></description><link>http://direct.ecency.com/search-enigne/@security101/en-shodan-a-slightly-different-search-engine</link><guid isPermaLink="true">http://direct.ecency.com/search-enigne/@security101/en-shodan-a-slightly-different-search-engine</guid><category><![CDATA[search-enigne]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 10 Mar 2018 13:51:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrRwi79dxv9NTieZ7DBL8E8ktFVBQ3ZiFxoYVwKWK6CHCtumQADwFBPiQczWyZBmNoF2ChBMaNBTnceuoL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] Shodan - Eine etwas andere Suchmaschine]]></title><description><![CDATA[Im Zuge der Digitalisierung werden immer mehr Geräte an das Internet angebunden. Im Folgenden möchte ich eine Suchmaschine hierfür vorstellen. Mein Anspruch ist es hierbei nicht, genauer auf einzelne]]></description><link>http://direct.ecency.com/deutsch/@security101/de-shodan-eine-etwas-andere-suchmaschine</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-shodan-eine-etwas-andere-suchmaschine</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Sat, 03 Mar 2018 20:25:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBrRwi79dxv9NTieZ7DBL8E8ktFVBQ3ZiFxoYVwKWK6CHCtumQADwFBPiQczWyZBmNoF2ChBMaNBTnceuoL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[EN] U2F - Universal Second Factor - The basic functionality]]></title><description><![CDATA[I have already mentioned the TOTP procedure for 2-factor authentication in another article. In this one I would like to mention U2F. I will sketch out and explain the individual mechanisms step by step.]]></description><link>http://direct.ecency.com/steemstem/@security101/en-u2f-universal-second-factor-the-basic-functionality</link><guid isPermaLink="true">http://direct.ecency.com/steemstem/@security101/en-u2f-universal-second-factor-the-basic-functionality</guid><category><![CDATA[steemstem]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Tue, 20 Feb 2018 16:32:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxeo9Nxy36EVrK61u6vBSY2bYJiwe8BLxdKhXf82SM3JxHXGwc9TsYEPgLDcmL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[DE] U2F - Universal Second Factor - Die grundlegende Funktionsweise]]></title><description><![CDATA[Nachdem ich bereits das TOTP-Verfahren zur 2-Faktor-Authentifikation in einem Beitrag erwähnt habe, möchte ich in diesem auf U2F eingehen. Hierfür werde ich Schritt für Schritt die einzelnen Mechanismen]]></description><link>http://direct.ecency.com/deutsch/@security101/de-u2f-universal-second-factor-die-grundlegende-funktionsweise</link><guid isPermaLink="true">http://direct.ecency.com/deutsch/@security101/de-u2f-universal-second-factor-die-grundlegende-funktionsweise</guid><category><![CDATA[deutsch]]></category><dc:creator><![CDATA[security101]]></dc:creator><pubDate>Mon, 12 Feb 2018 15:33:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxeo9Nxy36EVrK61u6vBSY2bYJiwe8BLxdKhXf82SM3JxHXGwc9TsYEPgLDcmL?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>