<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/security/</link><description>Recent content in Security on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 01 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://r0tbyt3.dev/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Botnet Simulation &amp; C2 Framework</title><link>https://r0tbyt3.dev/projects/botnet/</link><pubDate>Sat, 01 Nov 2025 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/projects/botnet/</guid><description>Overview Developed an educational botnet server with synchronized multi-client handling, remote shell execution, bidirectional file transfer, and modular command handlers for defensive and offensive cybersecurity demonstrations.
Technologies: Python, socket programming, TCP/IP, threading
Features Multi-client handling with synchronized connections Remote shell execution capabilities Bidirectional file transfer functionality Modular command handler architecture Details More details coming soon&amp;hellip;</description></item><item><title>Domain Name Enumeration Tool</title><link>https://r0tbyt3.dev/projects/domain-name-system-enumeration-tool/</link><pubDate>Sun, 01 Jun 2025 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/projects/domain-name-system-enumeration-tool/</guid><description>Overview Engineered a multi-threaded DNS reconnaissance tool processing 500-1,000 subdomains/minute with ThreadPoolExecutor (50 workers), implementing DNS enumeration capabilities including DNSSEC validation, and automated security pattern matching with comprehensive error handling.
Technologies: Python, threading, concurrent.futures, dnspython
Features Multi-threaded DNS processing (500-1,000 subdomains/minute) ThreadPoolExecutor with 50 workers for parallel processing DNSSEC validation Automated security pattern matching Comprehensive error handling Details More details coming soon&amp;hellip;</description></item><item><title>Access control lists (ACLs)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/access-control-lists-acls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/access-control-lists-acls/</guid><description>Access control lists (ACLs) Access Control Lists - lists defining which users or systems are granted access to specific resources.
Related Links: Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>API security best practices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/api-security-best-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/api-security-best-practices/</guid><description>API security best practices API Security Best Practices - techniques for securing APIs against common vulnerabilities and attacks.
Related Links: Container security best practices CORS CSP Mitigation techniques OWASP risks Server security</description></item><item><title>Argon2</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/argon2/</guid><description>Argon2 Argon2 - memory-hard password hashing algorithm designed to resist GPU and brute-force attacks.
Related Links: Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Attribute-based access control (ABAC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/attribute-based-access-control-abac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/attribute-based-access-control-abac/</guid><description>Attribute-based access control (ABAC) Attribute-Based Access Control - authorization model granting access based on user attributes and policies.
Related Links: Access control lists (ACLs) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/</guid><description>Authentication Authentication - mechanisms for verifying identity including passwords, tokens, sessions, and multi-factor methods.
Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication Related Links: Authorization Cryptography Web Security</description></item><item><title>Authentication and Authorization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authentication-and-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authentication-and-authorization/</guid><description>Authentication and Authorization Authentication and Authorization - mechanisms for verifying identity and controlling access to resources.
Related Links: AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>AuthN vs AuthZ</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authn-vs-authz/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/authn-vs-authz/</guid><description>AuthN vs AuthZ AuthN vs AuthZ - distinction between authentication (who you are) and authorization (what you can do).
Related Links: Authentication and Authorization Multi-factor authentication (MFA) Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>Authorization</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/</guid><description>Authorization Authorization - mechanisms for controlling access to resources based on verified identity and assigned permissions.
Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC) Role-based access control (RBAC) Related Links: Authentication Cryptography Web Security</description></item><item><title>Bcrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/bcrypt/</guid><description>Bcrypt Bcrypt - adaptive password hashing function designed to be computationally expensive to resist cracking.
Related Links: Argon2 Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Capability-based access control</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/capability-based-access-control/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/capability-based-access-control/</guid><description>Capability-based access control Capability-Based Access Control - security model where access rights are represented as unforgeable tokens.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) OAuth OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>Container security best practices</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/container-security-best-practices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/container-security-best-practices/</guid><description>Container security best practices Container Security Best Practices - guidelines for securing Docker and container-based deployments.
Related Links: API security best practices CORS CSP Mitigation techniques OWASP risks Server security</description></item><item><title>CORS</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/cors/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/cors/</guid><description>CORS CORS - browser security mechanism controlling how web pages request resources from different origins.
Related Links: API security best practices Container security best practices CSP Mitigation techniques OWASP risks Server security</description></item><item><title>Cryptography</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/</guid><description>Cryptography Cryptography - cryptographic primitives and protocols used to protect data integrity, confidentiality, and authenticity.
Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256 TLS Related Links: Authentication Authorization Web Security</description></item><item><title>CSP</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/csp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/csp/</guid><description>CSP Content Security Policy - HTTP security header restricting resource loading to prevent XSS attacks.
Related Links: API security best practices Container security best practices CORS Mitigation techniques OWASP risks Server security</description></item><item><title>Hashing algorithms</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/hashing-algorithms/</guid><description>Hashing algorithms Hashing Algorithms - functions mapping data of arbitrary size to fixed-size values for integrity and security.
Related Links: Argon2 Bcrypt MD5 Scrypt SHA-1 SHA-256 TLS</description></item><item><title>MD5</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/md5/</guid><description>MD5 MD5 - cryptographic hash function producing a 128-bit digest, now considered insecure for security use.
Related Links: Argon2 Bcrypt Hashing algorithms Scrypt SHA-1 SHA-256 TLS</description></item><item><title>Mitigation techniques</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/mitigation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/mitigation-techniques/</guid><description>Mitigation techniques Mitigation Techniques - strategies for reducing the impact or likelihood of security vulnerabilities.
Related Links: API security best practices Container security best practices CORS CSP OWASP risks Server security</description></item><item><title>Multi-factor authentication (MFA)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/multi-factor-authentication-mfa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/multi-factor-authentication-mfa/</guid><description>Multi-factor authentication (MFA) Multi-Factor Authentication - security process requiring two or more verification methods to authenticate users.
Related Links: Authentication and Authorization AuthN vs AuthZ Password-based authentication Session and Token Security Token-based authentication</description></item><item><title>OAuth</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/oauth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/oauth/</guid><description>OAuth OAuth - open standard authorization framework enabling secure delegated access to user resources.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OpenID Connect (OIDC) Role-based access control (RBAC)</description></item><item><title>OpenID Connect (OIDC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/openid-connect-oidc/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/openid-connect-oidc/</guid><description>OpenID Connect (OIDC) OpenID Connect - identity layer built on OAuth 2.0 for authentication and user identity verification.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth Role-based access control (RBAC)</description></item><item><title>OWASP risks</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/owasp-risks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/owasp-risks/</guid><description>OWASP risks OWASP Risks - top ten web application security risks identified by the Open Web Application Security Project.
Related Links: API security best practices Container security best practices CORS CSP Mitigation techniques Server security</description></item><item><title>Password-based authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/password-based-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/password-based-authentication/</guid><description>Password-based authentication Password-Based Authentication - authentication mechanism using secret credentials known only to the user.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Session and Token Security Token-based authentication</description></item><item><title>Role-based access control (RBAC)</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/role-based-access-control-rbac/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authorization/role-based-access-control-rbac/</guid><description>Role-based access control (RBAC) Role-Based Access Control - authorization model assigning permissions based on user roles within an organization.
Related Links: Access control lists (ACLs) Attribute-based access control (ABAC) Capability-based access control OAuth OpenID Connect (OIDC)</description></item><item><title>Scrypt</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/scrypt/</guid><description>Scrypt Scrypt - password hashing function designed to be memory-intensive to resist hardware-based attacks.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 SHA-1 SHA-256 TLS</description></item><item><title>Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/</guid><description>Security Security - authentication, authorization, cryptography, and security best practices for backend systems.
Authentication Authorization Cryptography Web Security Related Links: Backend Engineering Concurrency Databases Django DSA Python System Design Web</description></item><item><title>Server security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/server-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/server-security/</guid><description>Server security Server Security - practices and configurations for protecting servers from unauthorized access and exploits.
Related Links: API security best practices Container security best practices CORS CSP Mitigation techniques OWASP risks</description></item><item><title>Session and Token Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/session-and-token-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/session-and-token-security/</guid><description>Session and Token Security Session and Token Security - best practices for securely managing user sessions and authentication tokens.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Token-based authentication</description></item><item><title>SHA-1</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-1/</guid><description>SHA-1 SHA-1 - cryptographic hash function producing a 160-bit digest, deprecated due to collision vulnerabilities.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-256 TLS</description></item><item><title>SHA-256</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/sha-256/</guid><description>SHA-256 SHA-256 - secure hash algorithm producing a 256-bit digest, widely used for data integrity and signatures.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 TLS</description></item><item><title>TLS</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/cryptography/tls/</guid><description>TLS TLS - cryptographic protocol providing secure communication over a network through encryption and certificates.
Related Links: Argon2 Bcrypt Hashing algorithms MD5 Scrypt SHA-1 SHA-256</description></item><item><title>Token-based authentication</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/token-based-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/authentication/token-based-authentication/</guid><description>Token-based authentication Token-Based Authentication - authentication approach using digitally signed tokens instead of server-side sessions.
Related Links: Authentication and Authorization AuthN vs AuthZ Multi-factor authentication (MFA) Password-based authentication Session and Token Security</description></item><item><title>Web Security</title><link>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/backend-engineering/security/web-security/</guid><description>Web Security Web Security - browser and server-side protections against common web application vulnerabilities and attacks.
API security best practices Container security best practices CORS CSP Mitigation techniques OWASP risks Server security Related Links: Authentication Authorization Cryptography</description></item></channel></rss>