<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AES | RobWillis.info</title>
	<atom:link href="/tag/aes/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Tue, 22 Apr 2025 08:48:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Introducing Invoke-EncryptionSimulator: A PowerShell Tool for Simulating Late-Stage Ransomware Attacks</title>
		<link>/2024/03/powershell-script-invoke-encryptionsimulator/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 14 Mar 2024 04:53:37 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[AES]]></category>
		<category><![CDATA[Detection Engineering]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[script]]></category>
		<guid isPermaLink="false">/?p=6120</guid>

					<description><![CDATA[<p>Invoke-EncryptionSimulator Invoke-EncryptionSimulator is designed to be a simple and safe way to emulate the encryption stage of a ransomware deployment to aid in development and testing of controls focusing on file system level changes rather than process related telemetry. Invoke-EncryptionSimulator is designed to be a simple and safe way to emulate the encryption stage of [&#8230;]</p>
The post <a href="/2024/03/powershell-script-invoke-encryptionsimulator/">Introducing Invoke-EncryptionSimulator: A PowerShell Tool for Simulating Late-Stage Ransomware Attacks</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>IIS 8 with ECC certificates &#8211; increasing your SSL Security on Windows Server 2012</title>
		<link>/2016/02/iis-8-with-ecc-certificates-increasing-your-ssl-security-on-windows-server-2012/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 12 Feb 2016 10:20:26 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[2012]]></category>
		<category><![CDATA[2012 R2]]></category>
		<category><![CDATA[AES]]></category>
		<category><![CDATA[CSR]]></category>
		<category><![CDATA[ECC]]></category>
		<category><![CDATA[ECDHE]]></category>
		<category><![CDATA[ECDSA]]></category>
		<category><![CDATA[Elliptic Curve Cryptography]]></category>
		<category><![CDATA[GCM]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Obsolete Cryotography]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[tls]]></category>
		<category><![CDATA[Windows Server]]></category>
		<guid isPermaLink="false">/?p=2624</guid>

					<description><![CDATA[<p>What is an ECC Certificate and why would you need one? The main difference with an Elliptic Curve Cryptography (ECC) certificate is with how the certificate is signed, in this case the Elliptic Curve Digital Signature Algorithm (ECDSA) is used vs the standard RSA we are used to seeing. Once you have a certificate signed [&#8230;]</p>
The post <a href="/2016/02/iis-8-with-ecc-certificates-increasing-your-ssl-security-on-windows-server-2012/">IIS 8 with ECC certificates – increasing your SSL Security on Windows Server 2012</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
