Skip to main content

original.flipster - demystifying software one rant at a time

Welcome to my crib 💯

On this here digital home of mine, I am going to share the occasional tech-related rant. Since I low-key wanted to be writer but ended up a developer, this is what I am writing about here.

The goal of sharing my humble views is to demystify as well as simplify a lot that is going on within the software industry. Add to the mix that I want to keep it light and entertain more than I want to educate, while still giving the one or the other thought-provoking impulse to some. Ideally this can do its teeny-weeny part in democratizing and simplifying the industry some. Elitism is so not my thing.

original.flipster logo witch chainz, cat and fire

nothing to see here, that’s just me

nothing to see here, that’s just me

nothing to see here, that’s just me

nothing to see here, that’s just me

nothing to see here, that’s just me

About me

I’ve been in and out of the software industry for quite a while and I would never consider myself an expert, but I do see things happening and I am not afraid to comment on them. Still, I know enough to be aware that I don’t know anything. I got a PhD in getting shit done, though.

Recent

What's Cracking? Oh, must be your KeePass password!
·815 words·4 mins
Red Team Security Black Hat Go
Recently, I found myself stumbling upon a .kdbx (KeePass Database) file as part of a backup in a CTF and needed to crack the password to gain access to the secrets contained and consequently elevate my privileges. Problem was, that I couldn’t get the hash in the right format for cracking it with john: unsupported database file version (4). So, I built keepass-rush to do so myself.
Read more
Privilege Escalation via DPAPI
··672 words·4 mins
Red Team Security Windows
DPAPI can be useful in situations when you got an initial foothold on a Windows host and are seeking to escalate your privileges. More specifically, we are talking a scenarios where your initial access user shares their home folder with a privileged account. This is a setup that is commonly found in Active Directory contexts, when a single person is operating with 2 distinct users, 1 for their everyday work and another one for dedicated administrative actions such as managing other users & groups that required elevated privileges.
Read more
Go KonMari on your SQL queries, bruh!
··1771 words·9 mins
Bestest-Practices Jpa Unfold Before You Code
Let’s dive into the mess that we get ourselves into when naively relying on JPA and its implementations and see how to generate nothing else but SQL statements that spark joy! Spring Data, JPA, Hibernate got our backs though to avoid such a mess, right? HELL NO! All they do is teach you a lesson to not rely on other systems without verifying the fundamentals functioning as expected yourself! There is ALWAYS pitfalls and you do not want to iron out those kinks in production.
Read more
Go Big or Go Home - The Beauty of the Monolith
··1988 words·10 mins
Architecture Don't Believe the Hype I'm Simple & I Know It
The microservices hype is 4 real, but also completely unjustified. Netflix somehow claims to have pulled it off and suddenly everyone is slaying perfectly good monoliths into tiny pieces just to secure a spot on the bandwagon. But, microservices are out there to hurt you, just wait and see. Meanwhile, monolithic architectures who have always been kind to us have gone out of fashion without any good reason. As Public Enemy said it best: ‘Don’t Believe the Hype’.
Read more