The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,860 other subscribers

Archive for the ‘Security’ Category

If you develop web-sites, be sure their basics work without JavaScript, as JavaScript is a security risk

Posted by jpluimers on 2025/12/18

I have had JavaScript disabled by default for years now, which means that:

  • if your site requires JavaScript, I will opt for an alternative
  • I will block anything ad related, even if it means I cannot use your site

The reasons are simple:

  1. JavaScript has become a big security threat over time. Be it tracking (hello fingerprinting!), data leakage, direct attacks, supply chain attacks, sloppy code or other risks, JavaScript is not vulnerable just by itself, but especially the eco systems (hello npm – 2 attacks in September 2025 alone – and advertising networks) using it. Just a few references:
    1. [Wayback/Archive] The perils of JavaScript: How we’ve broken the internet’s security
    2. [Wayback/Archive] Most Common Security Vulnerabilities Using JavaScript – SecureCoding
    3. [Wayback/Archive] Supply Chain Security Alert: Popular Nx Build System Package Compromised with Data-Stealing Malware – StepSecurity
    4. [Wayback/Archive] Wormable Malware Causing Supply Chain Compromise of npm Code Packages – Arctic Wolf
    5. [Wayback/Archive] FingerprintJS | Identify Every Web Visitor & Mobile Device
  2. JavaScript has become a huge resource hog. Disabling JavaScript by default increased the snappiness and battery life of my laptops and smartphones significantly. In addition, it makes it way easier to read region-blocked content. Double win!

The below thread by [Wayback/Archive] Dr. Christopher Kunz (@christopherkunz@chaos.social) – chaos.social sparked me to finally write why and add some relevant links.

Thread:

Read the rest of this entry »

Posted in Development, Infosec (Information Security), JavaScript/ECMAScript, Power User, Scripting, Security, Software Development, Web Development | Leave a Comment »

Wat notities over het CDN wat de NPO gebruikt voor podcasts

Posted by jpluimers on 2025/12/11

Nog. niet gecontroleerd, maar wellicht werkt dit ook voor (fragmenten van) radiouitzendingen?

Uit een draad over het liedje “Met puntjes” van Joke Bruijs die een paar maanden terug enkele dagen na haar boezem vriend en ex-man Gerard Cox overleed¹.

Ionica Smeets schreef over het liedje op Mastodon², maar de link naar de audio van de podcast [Wayback/Archive] Andermans Veren – Beluister Andermans Veren zondag 14 januari 2018 | Podcasts | NPO Radio 5 verdween al snel.

Omdat ik al eerder een probleem had met de audio van [Wayback/Archive] Keihard de Beste – NPO Podcast te downloaden, dook ik in de CDN die de NPO gebruikt.

De archivers hadden er wat problemen mee dus het staat in 2 stukken:

  1. [Wayback/Archive] Jeroen Wiert Pluimers: “@ionica ik ga het je proberen uit te leggen. En dan kan jij het vast in veel simpeler bewoording weer terug uitleggen zodat anderen het ook begrijpen. …” – Mastodon
  2. [Wayback/Archive] Jeroen Wiert Pluimers: “@ionica hopelijk heb ik je een beetje kunnen helpen met je opmerkingen in…” – Mastodon
  3. ³

Er waren wat zijstapjes naar onder meer hoe je een goede vraag op het internet moet stellen, dus de draad werd lang (:

Hieronder de volledige tekst, aangevuld met wat gearchiveerde links. Maar eerst twee versies van het liedje “Met puntjes” van Joke Bruijs: opnamen van 1986 en 1988:

Read the rest of this entry »

Posted in Authentication, CDN (Content Delivery Network), Cloud, CSS, Development, Hashing, HMAC, HTML, Infrastructure, Power User, Security, Software Development, Web Development | Leave a Comment »

Security alarm provider Woonveilig/Egardia really needs to work on their notifications towards end-users: outages are too frequend and not communicationed on to their customers

Posted by jpluimers on 2025/12/01

This was no incident:

[Wayback/Archive] Jeroen Wiert Pluimers @wiert@mastodon.social on Twitter: “Als zowel @WoonVeilig als @Egardia op 2 verschillende systemen een systeemtest failure geven en de apps 500-errors weet je dat hun infrastructuur plat ligt. Al een paar uur geleden, dus heel benieuwd hoe snel ze hun engineers wakker kunnen bellen.”

One of the problem is that Egardia/Woonveilig sees their social media channels as a broadcast-only. You can for instance se this when searching doing a [Wayback/Archive] egardia – Twitter Search or [Wayback/Archive] woonveilig – Twitter Search: no answers from them.

There were similar incidents in the past which I did not document on Twitter, but this outage was so large I had to documented it. So I started the [Wayback/Archive] Thread by @jpluimers on Thread Reader App with these images:

Read the rest of this entry »

Posted in Power User, Security | 1 Comment »

Be inquisitive: a Thread by @cyb3rops on Thread Reader App – The act of hiding is often more suspicious than what’s being hidden.

Posted by jpluimers on 2025/11/19

[Wayback/Archive] Thread by @cyb3rops on Thread Reader App – Thread Reader App

If your agent gets flooded – detect the flooding.
If code gets obfuscated – detect the obfuscation.
If ETW gets silenced – detect the silence.
If the EDR gets killed – detect the killing.
If logs get cleared – detect the clearing.

The act of hiding is often more suspicious than what’s being hidden.

It’s like a surveillance camera going black or freezing.
That is the signal.
I’ve been doing this successfully for years.

I detect obfuscated crap all the time.
People ask, “What is it?”
I say, “No fucking clue. Could be:
– a Themida-packed sample with a Microsoft copyright,
– a UPX-packed ELF with a 1-char filename,
– a PowerShell script that looks like static noise, or
– a fake svchost.exe with no Microsoft copyright.”

I don’t need to know what it is.
It’s obviously shady.
That’s enough to detect it – and deal with it.
There’s a Chinese saying that fits perfectly: 欲蓋彌彰
The more you try to hide it, the more obvious it becomes.

--jeroen

Posted in Blue team, Development, DevOps, LifeHacker, Power User, Red team, Security, Software Development | Leave a Comment »

EGBG tegenscript (via Angrynerds 023)

Posted by jpluimers on 2025/11/19

Voor mijn link archief: script tegen telemarketeers: [Wayback/Archive] EGBG tegenscript

Met name deze onderdelen op de pagina:

Via [Wayback/Archive] Angrynerds 023 – YouTube

–jeroen

Posted in LifeHacker, Power User, Security | Leave a Comment »

Cyber bands and relates stickers – loet.bar + ZBF

Posted by jpluimers on 2025/10/27

[Wayback/Archive] Cyber – loet.bar + ZBF examples

..

Read the rest of this entry »

Posted in Cyber, Fun, Power User, Security | Leave a Comment »

Fraudehelpdesk ontvangt groot aantal meldingen over fraudetelefoontjes – Security.NL

Posted by jpluimers on 2025/10/03

[Wayback/Archive] Fraudehelpdesk ontvangt groot aantal meldingen over fraudetelefoontjes – Security.NL

Ik had zelf al gemerkt dat de hoeveelheid SPAM calls enorm was toegenomen: 2025 first quarter (our winter): a set back in energy, slowly getting back, taking preventions to keep this from happening again

Kennelijk ben ik niet alleen hierin.

--jeroen

Posted in About, Personal, Power User, Security | Leave a Comment »

i-am-shodan/USBArmyKnife: USB Army Knife – the ultimate close access tool for penetration testers and red teamers.

Posted by jpluimers on 2025/09/30

Now that I got pointed to this twice (see “Via” below), I need to get one so I can play with it: [Wayback/Archive] GitHub – i-am-shodan/USBArmyKnife: USB Army Knife – the ultimate close access tool for penetration testers and red teamers.

Via:

Read the rest of this entry »

Posted in *nix, *nix-tools, Blue team, Bluetooth, Development, Encryption, ESP32, Hardware, Hardware Development, Hardware Interfacing, Home Audio/Video, HTTPS/TLS security, Infosec (Information Security), Network-and-equipment, Power User, Red team, Software Development, WiFi, Wireshark | Tagged: | Leave a Comment »

DeCENC is yet another way to beat Amazon, Netflix video DRM • The Register

Posted by jpluimers on 2025/09/12

From a while ago. I wonder what the current state is.

[Wayback/Archive] DeCENC is yet another way to beat Amazon, Netflix video DRM • The Register

--jeroen

Posted in Development, Encryption, Media, Media Streaming, Power User, Security, Software Development | Leave a Comment »

vx-underground (@vxunderground) / Twitter

Posted by jpluimers on 2025/09/09

I thought I had been living under a stone for decades when I bumped into vx-underground (@vxunderground) / Twitter

The largest collection of malware source code, samples, and papers on the internet.

Password: infected

That appeared to be untrue as vx-underground, ran by a team of volunteers, started in 2019 ([Archive] web.archive.org/web//vx-underground.org) right when a few crisis in my life came together at the same time.

So here are the links for my archive as they are great content for both Red Teams and Blue Teams on many things cyber security related:

Read the rest of this entry »

Posted in Blue team, Pen Testing, Power User, Red team, Security | Leave a Comment »