Application – Page 3 – POFTUT

Category: Application

0

How To Read RSA, X509, PKCS12 Certificates with OpenSSL?

OpenSSL provides read different type of certificate and encoding formats. OpenSSL supports certificate formats like RSA, X509, PCKS12 etc. We will look how to read these certificate formats with OpenSSL. Read RSA Private Key RSA is popular format use to create asymmetric key pairs those named public and private key. We can use rsa verb to read RSA private key with the following command.

We can see that the first...

1

How To Create Self Signed Root Certificate with OpenSSL

OpenSSL provides cryptographic libraries and features. We can use OpenSSL from reading DER files to generate random numbers. But one of the most used feature is creating a Self Signed Certificate. , Self Signed Certificate X509 is the certificate standard used in internet and corporate today. X509 certificates are designed to create a tree like trust hierarchy between X509 certificates. For example Google is a trusted entity and poftut.com is another...

1

How To Convert DER To PEM and PEM to DER Certificate Format with OpenSSL?

DER and PEM are formats used in X509 and other certificates to store Public, Private Keys and other related information. OpenSSL provides a lot of features for manipulating PEM and DER certificates. We can use OpenSSL to convert DER to PEM format and vice versa. Convert DER Format To PEM Format For RSA Key We may have an RSA Key in DER format and we want to convert it into...

0

How To Determine and Print OpenSSL Version?

OpenSSL is very long running project which have passed a lot of versions. Newer versions provides more features, bug fixes and security patches. For example in year 2014 a serious security hole Heart Bleed discovered in OpenSSL versions and affected OpenSSL libraries are defined as versions.Following versions was vulnerable to Hear Bleed. OpenSSL 1.0.1 trough 1.0.1f inclusive OpenSSL 1.0.1g is not vulnerable So version is important part of the OpenSSL...

1

How To Install and Use OpenSSL Library In Python Applications?

OpenSSL is popular security library used by a lot of products, applications, vendors. OpenSSL provides libraries for the most of the programming languages. Python is popular programming language too. We can use OpenSSL library in Python applications. In this tutorial we will develop an example application that uses OpenSSL Python Library and bindings. Install OpenSSL Python Library with Pip We can use pip install for all Linux distributions like Ubuntu, Debian,...

0

How To Use OpenSSL s_client To Check and Verify SSL/TLS Of HTTPS Webserver?

OpenSSL provides different features and tools for SSL/TLS related operations. s_lient is a tool used to connect, check, list HTTPS, TLS/SSL related information. Simply we can check remote TLS/SSL connection with s_client . In this tutorials we will look different use cases of s_client . Check TLS/SSL Of Website The basic and most popular use case for s_client is just connecting remote TLS/SSL website. We will provide the web site with the HTTPS port...

0

Data Classification and Categorization with Benefits

Data classification is important part of the ISO 27001 and Enterprise Security Governance. Data classification will set labels and categories to the given data types. These types will be used to set secrecy, sensitivity, confidentiality levels. If we set all data high security level or classification this will create high cost and operational complexity and expense. So we should classify and categorize them appropriately accord to organization needs, situation etc....

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and have limited resources to use. Restrictions We will have mainly following restrictions while planning security. Budget Personnel Requirements Organization Culture...

0

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of current security situation. We will look all of them and more in below. We will simply start defining related term...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics, price etc. Information Systems Security Certification Consortium (ISC) CISSP exam is governed by ISC. ISC is global non-profit organization. ISC...

Enjoy this blog? Please spread the word :)