Lisp Interpreter in Rust (a.k.a Juoni)

I wrote an interpreter for a Scheme/LISP-like language in Rust. It was originally an assignment for Compiler Technology course at University of Jyväskylä. Originally meant to be rather smaller, I added one feature after another and.. result is something I feel very proud of and want to showcase it.

It uses Pest.rs for parsing - a very powerful library, which I’d recommend people to try if interested.

It can be downloaded from GitLab


More

SSH Bots Attack Again, or: new set of observations on SSH bruteforcing attempts

Introduction

This post is a continuance to the topic presented in an earlier post of mine, Attack of the SSH bots As I took a data mining course for the spring semester, I had an opportunity to spend time furthering my research on SSH attack trends, and that’s what I indeed did.

This post is essentially a paraphrasing of the original slides as presented in the final seminar for the course; these slides and attached materials are linked at the end of this post.


More

RPiDAC - producing audio without a sound card

Excuse me…?

Yea, you read right. How to produce sound using a Raspberry Pi, without using its integrated sound card.

This idea was originally created for an IoT course I took; I thought it would be amusing for wider audiences as well, so I decided to write a blog post about it as well.


More

Attack of the SSH Bots - observations on SSH brute-forcing attempts

Introduction

As publicly known, I have an active home server for a variety of purposes. I recently did something that could be said to be a major renovation; a big part of the internal software setups were replaced completely, and all of them were substantially updated or at least refactored to be better suitable for my current needs.

It is considered to be common knowledge that SSH bots are constantly on the hunt for vulnerable hosts. It is also an equally well known fact for me that my server was probed by these bots (as shown on firewall logs), but I had not systematically collected any statistical data about them.

So, for personal interest, I set up an automated statistical logger for SSH services. It observes SSH probing attempts, and jots down information in a easy-to-process format. The results were quite interesting indeed, in my personal opinion.

Note that all of these observations are about password-based login attempts. Even though my logging system would have logged failed public-key login attempts, absolutely zero of them occurred. This is an interesting observation in and of itself.


More