<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Apuntes de root</title>
    <link>https://blog.099c.org/tags/security/</link>
    <description>Recent content in Security on Apuntes de root</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <managingEditor>jorti@pm.me (Juan Orti Alcaine)</managingEditor>
    <webMaster>jorti@pm.me (Juan Orti Alcaine)</webMaster>
    <lastBuildDate>Fri, 06 Mar 2026 09:14:09 +0100</lastBuildDate>
    <atom:link href="https://blog.099c.org/tags/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Bulwark: block attacking IPs at the router level</title>
      <link>https://blog.099c.org/posts/bulwark-block-attacking-ips-at-router-level/</link>
      <pubDate>Fri, 06 Mar 2026 09:14:09 +0100</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/bulwark-block-attacking-ips-at-router-level/</guid>
      <description>&lt;p&gt;Inspired on Crowdsec firewall bouncer, and also with the intention of learning&#xA;some Rust, I&amp;rsquo;ve created &lt;a href=&#34;https://codeberg.org/jorti/bulwark&#34;&gt;Bulwark&lt;/a&gt;, a small program to run in a OpenWrt router&#xA;(or any Linux machine) to ban IPs of attacks detected by my servers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>From Fail2ban to Reaction</title>
      <link>https://blog.099c.org/posts/from-fail2ban-to-reaction/</link>
      <pubDate>Tue, 03 Mar 2026 16:35:37 +0100</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/from-fail2ban-to-reaction/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://github.com/fail2ban/fail2ban&#34;&gt;Fail2ban&lt;/a&gt; has been an important security tool I&amp;rsquo;ve been using in my servers for many years.&#xA;However sometimes is difficult to configure, lacks certain features and can consume too many resources.&lt;/p&gt;&#xA;&lt;p&gt;Recently I&amp;rsquo;ve switched to &lt;a href=&#34;https://reaction.ppom.me/&#34;&gt;Reaction&lt;/a&gt;, a new tool with the same philosophy:&#xA;monitor logs and execute some actions based on log matches. Reaction is written&#xA;in Rust, so it&amp;rsquo;s fast and resource efficient.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sandbox Steam running it under a different account</title>
      <link>https://blog.099c.org/posts/sandbox-steam-running-it-under-a-different-account/</link>
      <pubDate>Thu, 14 Jul 2016 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/sandbox-steam-running-it-under-a-different-account/</guid>
      <description>&lt;p&gt;To improve my system&amp;rsquo;s security, I&amp;rsquo;ve configured Steam to be run as a different Linux account. This guide is inspired in &lt;a href=&#34;https://www.reddit.com/r/linux_gaming/comments/46agy3/running_steam_as_another_user/&#34;&gt;this thread&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Export non-exportable private keys from Windows key store</title>
      <link>https://blog.099c.org/posts/export-non-exportable-private-keys-from-windows-key-store/</link>
      <pubDate>Tue, 16 Dec 2014 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/export-non-exportable-private-keys-from-windows-key-store/</guid>
      <description>&lt;p&gt;When I was looking for a utility to export the non-exportable private keys in Windows, I found the &lt;a href=&#34;https://github.com/gentilkiwi/mimikatz&#34; title=&#34;mimikatz&#34;&gt;mimikatz&lt;/a&gt; tool, which enabled me to do that and a lot more.&lt;/p&gt;&#xA;&lt;p&gt;To export the private keys, run mimikatz as administrator and type:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-gdscript3&#34; data-lang=&#34;gdscript3&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;crypto&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;::&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;capi&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;n&#34;&gt;crypto&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;::&lt;/span&gt;&lt;span class=&#34;n&#34;&gt;certificates&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;/&lt;/span&gt;&lt;span class=&#34;k&#34;&gt;export&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;And you&amp;rsquo;ll get the certicates exported with the password mimikatz. You can also export the machine certificates with &lt;code&gt;/systemstore&lt;/code&gt; flag. See the &lt;a href=&#34;https://github.com/gentilkiwi/mimikatz/wiki/module-%7E-crypto#certificates&#34; title=&#34;mimikatz certifcates&#34;&gt;wiki&lt;/a&gt; for more info.&lt;/p&gt;&#xA;&lt;p&gt;This tool is detected as a threat by many antivirus, so you&amp;rsquo;ll have to probably disable yours before using it.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
