<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Defensive Security on Raizen | Blog</title><link>https://rai2en.github.io/tags/defensive-security/</link><description>Recent content in Defensive Security on Raizen | Blog</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Rai2en</copyright><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rai2en.github.io/tags/defensive-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Active Directory Internal Pentest Lab - From Recon to Domain Compromise</title><link>https://rai2en.github.io/posts/active-directory-internal-pentest-lab/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/active-directory-internal-pentest-lab/</guid><description>Projet personnel de pentest interne Active Directory: cartographie réseau, exploitation Linux, pivot, Kerberoasting, DCSync, Pass-the-Hash et recommandations défensives.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/active-directory-internal-pentest-lab/cover.png"/></item><item><title>CVE-2026-31431 (Copy Fail) - Linux Kernel LPE Deep Dive</title><link>https://rai2en.github.io/posts/cve-2026-31431-copy-fail/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/cve-2026-31431-copy-fail/</guid><description>Analyse ultra complète de CVE-2026-31431 (Copy Fail): cause racine dans algif_aead/AF_ALG, conditions d&amp;rsquo;exploitation, impact réel, détection, mitigation et runbook de remédiation en production.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/cve-2026-31431-copy-fail/cover.png"/></item><item><title>Secure Network Architecture Lab - Vagrant, Firewall, TLS and Hardening</title><link>https://rai2en.github.io/posts/secure-network-architecture-lab/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/secure-network-architecture-lab/</guid><description>Projet personnel de déploiement d&amp;rsquo;une architecture réseau sécurisée avec Vagrant: firewall, segmentation, serveur web HTTPS, base de données isolée, Fail2ban, tests d&amp;rsquo;attaque et validation défensive.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/secure-network-architecture-lab/cover.png"/></item><item><title>Web Application Pentest Lab - IDOR, LFI, SQLi and Stored XSS</title><link>https://rai2en.github.io/posts/web-application-pentest-lab/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/web-application-pentest-lab/</guid><description>Projet personnel de pentest web: manipulation HTTP, IDOR, LFI, reverse shell, SQL Injection, XSS stockée, vol de session et recommandations OWASP.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/web-application-pentest-lab/cover.png"/></item></channel></rss>