MeetUps and Presentations

cyberstorm.mu meetup on OpenSource Licensing with Dr Till Jaeger

Estimated read time 2 min read

It was a great opportunity to meet with Dr. Till Jaeger, Attorney at Law on cybersecurity, laws, trademarks and opensource licensing on Tuesday the 02nd of October 2018 at Flying Dodo, Bagatelle Mall. The event was announced on the official [Read More…]

MeetUps and Presentations

IETF 102 hackathon remotely from Mauritius

The cyberstorm.mu team has been participating in several IETF hackathons these recent years. For the IETF 102 hackathon, we focused tremendously on innovation: The goal to create two teams for the TLS 1.3 project, one for the Implementation team and [Read More…]

MeetUps and Presentations Security

Operation JASK – Just a Single Keystroke

Estimated read time 3 min read

Apart from the IETF hackathons, the cyberstorm.mu team also focused on internal hackathon either remotely or on-site participation. Another remote hackathon was already in progress since Saturday the 16th of June 2018. It was named Operation JASK – Just a [Read More…]

Linux System Security

Linux memory analysis with Lime and Volatility

Lime is a Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full memory captures on Android devices. [Read More…]

Linux System Security

Auditing Linux Operating System with Lynis

Estimated read time 6 min read

Auditing a Linux System is one of the most important aspect when it comes to security. After deploying a simple Centos 7 Linux machine on virtual box, I made an audit using Lynis. It is amazing how many tiny flaws [Read More…]