About Coen

Follow Coen on LinkedIn

Posts by Coen

Surviving a cyber security job interview (Cryptography)

Posted on by  
Coen Goedegebure

This article answers 14 typical questions about cryptography you may get during a job interview for a security position or any IT-related assignment for that matter.

When working in IT, it is easy to skip over and assume the correctness of certain often used technologies. Especially in the field of cryptography it is a good idea to not try and reinvent the wheel, but use well maintained libraries and proven technology. However, to really advance in any IT field, it is important to understand the details of the technologies you work with. That is why during a job interview, the basic topics are often covered to probe the applicant’s knowledge level of the technical part of the job he or she is applying for.

Continue reading →

Trojans in your source code

Posted on by  
Coen Goedegebure

As part of my work I frequently perform source code reviews for security issues. Looking for vulnerabilities in the logic of the source code is not easy, but when the encoding of that code is attacked, things get unreal pretty fast. Especially when you realise how often code is copy-pasted from sites like StackOverflow.

This article describes the dangers of hidden Unicode control characters and how they can make your source code appear differently than it is executed.

Continue reading →

5 Phases of hacking

Posted on by  
Coen Goedegebure

An ethical hacker follows a similar process to that of a malicious hacker to gain and maintain access to a computer system. The process of a typical attack scenario can be broken down into five distinct phases, which are described in this article.

Continue reading →

shadow-left