Coen Goedegebure

[ Development, Security, Technology ]

  • Home
  • About
  • Contact
  • Donate
       
Featured Development / Security / Hacking

Why your company will be hacked

This is a short list of common reasons why your company is going to be hacked. Learn from the past to improve the future!

  • Coen Goedegebure
    Coen Goedegebure
3 min read
Featured Security / Hacking / Development

Buffer overflow attacks explained

How does a typical buffer overflow exploit work in code, at run-time and in memory and what can be achieved by running it?

  • Coen Goedegebure
    Coen Goedegebure
12 min read
Featured Security / Cryptography / Mathematics

How to survive an InfoSec job interview (cryptography)

This article answers 14 typical questions about cryptography you may get during a job interview for a security position or any IT-related assignment for that matter.

  • Coen Goedegebure
    Coen Goedegebure
14 min read
Featured Hacking / Security / Metasploit

Hacking Windows with Meterpreter

Explore the post-exploitation world of a hacked Windows machine. Steal credentials, key logging, screen capture, new accounts, download files and more.

  • Coen Goedegebure
    Coen Goedegebure
11 min read
Hacking / Security / Write-ups

SANS Holiday Hack Challenge 2020 write-up

This is my write-up for the 2020 SANS Holiday Hack Challenge. It contains the solutions for all terminals, objectives and side quests.

  • Coen Goedegebure
    Coen Goedegebure
61 min read
Hacking / Tips & Tricks

Getting started with the SANS Holiday Hack Challenge 2020

How to get started with the 2020 SANS Holiday Hack challenge: KringleCon 3

  • Coen Goedegebure
    Coen Goedegebure
5 min read
Hacking / Security / Development

SANS Holiday Hack Challenge 2019 Write-up

This article is my write-up for the 2019 SANS Holiday Hack Challenge. It contains the solutions for all terminals, puzzles and objectives

  • Coen Goedegebure
    Coen Goedegebure
90 min read
Hacking / Tips & Tricks

Getting started with the SANS Holiday Hack Challenge 2019

How to get started with the 2019 SANS Holiday Hack challenge: KringleCon

  • Coen Goedegebure
    Coen Goedegebure
4 min read
Development / Hacking / Tips & Tricks

Hosting a CTF made easy using Docker and DigitalOcean

Hosting a CTF can be a piece of cake by deploying a Docker container in a DigitalOcean Droplet. This article will run through this process. Fully automated script provided as well.

  • Coen Goedegebure
    Coen Goedegebure
7 min read
Hacking / Google / Security / Tips & Tricks

Two-Factor authentication: How to secure your accounts?

How to secure your online accounts by setting up two-factor authentication (2FA) and why is it important to do so? Step-by-step guide for 2FA.

  • Coen Goedegebure
    Coen Goedegebure
11 min read
Security / Hacking / Network

Executing a man-in-the-middle attack

How can you become a man-in-the-middle on a network to eavesdrop on user traffic and what can you do to protect yourself against such an attack?

  • Coen Goedegebure
    Coen Goedegebure
19 min read
Network / Development / Security

The OSI Model

Understanding the OSI model and the aspects of its 7 layers is important for any IT professional who is involved with networking and connectivity

  • Coen Goedegebure
    Coen Goedegebure
7 min read
Network / Security / Hacking / Development

TCP 3-way handshake and port scanning

How does the TCP 3-way handshake work and how is it used to perform a port scan?

  • Coen Goedegebure
    Coen Goedegebure
7 min read
OO-design / Design patterns / Development

SOLID Design Principles

This article helps you understand the five SOLID principles, one of the most important sets of design principles in object-oriented software development.

  • Coen Goedegebure
    Coen Goedegebure
7 min read
Security / Google / Hacking

Hosting a Cookie Stealer in Google Forms

This article describes a quick and easy way to have cookie stealing functionality for your XSS tests, by using Google Forms as a host.

  • Coen Goedegebure
    Coen Goedegebure
5 min read
Security / Hacking

How I got access to local AWS info via Jira

This article will describe how I exploited an SSRF vulnerability in an Atlassian plugin and gained access to AWS instance metadata via a local endpoint, explaining the theory and techniques along the way

  • Coen Goedegebure
    Coen Goedegebure
8 min read
Tips & Tricks

Forcing Facebook to update its link preview

Are you sharing a link on Facebook or Workplace and is the preview showing old information? This article shows you how to fix this by forcing Facebook to update its cache.

  • Coen Goedegebure
    Coen Goedegebure
2 min read
Ghost / Development / Tips & Tricks

How to add 'reading time' to your articles

It can be very useful for readers to know how much time they can expect to spend on an article before they engage. That's why I decided to add an estimated reading time to my blog. It will take approximately 3 minutes to read this article and find out how I implemented that.

  • Coen Goedegebure
    Coen Goedegebure
3 min read
Mathematics / Development / C#

Understanding Big-O notation

Big-O notation is used to describe the complexity of an algorithm relative to its input. This article helps to understand this notation by exploring the most common orders of magnitude and their algorithms.

  • Coen Goedegebure
    Coen Goedegebure
8 min read
Security / Hacking / Metasploit

Metasploit, WannaCry and Windows update

How to use Metasploit to execute the Eternalblue exploit (like WannaCry and Petya ransomware) and why you should install your latest Windows updates

  • Coen Goedegebure
    Coen Goedegebure
11 min read
Security / Hacking

5 Phases of hacking

An ethical hacker follows a similar process to that of a malicious hacker to gain and maintain access to a computer system. The process of a typical attack scenario can be broken down into five distinct phases, which are described in this article.

  • Coen Goedegebure
    Coen Goedegebure
3 min read
Ghost / Tips & Tricks

Creating a custom 404 error page in Ghost

The Ghost blogging platform allows you to create a custom error page when someone attempts to navigate to a page that does not exist.

  • Coen Goedegebure
    Coen Goedegebure
2 min read
Development / Design patterns / OO-design

An introduction to software design patterns

This article sets the basis for understanding design patterns and presents an introduction to the world of software design patterns by giving a brief description of all 23 Gang of Four patterns.

  • Coen Goedegebure
    Coen Goedegebure
17 min read
Ghost / Tips & Tricks

Sticky articles in Ghost

How to create sticky posts for your Ghost website? Using the Casper theme as example, but the details are valid for other themes as well.

  • Coen Goedegebure
    Coen Goedegebure
3 min read
C# / Development / .NET

Creating a module initializer in .NET

This article will cover the process, techniques and code required to automatically resolve an embedded library in C# and inject a module initializer into the compiled assembly using IL weaving.

  • Coen Goedegebure
    Coen Goedegebure
14 min read
Coen Goedegebure © 2025
Home Twitter LinkedIn Google+