{"version":1,"pages":[{"id":"-MQ8d1exDLKuxSZypnsi","title":"blakejarvis.com","pathname":"/","siteSpaceId":"sitesp_yoSgU","description":"Blog posts and quick notes related to pentesting, cybersecurity and technology."},{"id":"3BOibDBddI28TUMjTwiZ","title":"Setting up FTP with Amcrest Camera","pathname":"/home-assistant/setting-up-ftp-with-amcrest-camera","siteSpaceId":"sitesp_yoSgU","description":"Configuring FTP as a storage destination for Amcrest motion events","breadcrumbs":[{"label":"Home Assistant & Home Automations"}]},{"id":"F2lz0ecMYyGdVObgpaS1","title":"Home Assistant Amcrest Video Viewer","pathname":"/home-assistant/home-assistant-amcrest-video-viewer","siteSpaceId":"sitesp_yoSgU","description":"Using Docker and Python/Flask to display Amcrest video recordings","breadcrumbs":[{"label":"Home Assistant & Home Automations"}]},{"id":"-MWdIYHNp7d7rgltFRl4","title":"External Resources","pathname":"/oscp/oscp-external-resources","siteSpaceId":"sitesp_yoSgU","description":"Helpful resources outside of the Offensive Security course material","breadcrumbs":[{"label":"OSCP"}]},{"id":"-MWdKJFBq6njAKGt6qJN","title":"Buffer Overflow Framework","pathname":"/oscp/oscp-buffer-overflow-framework","siteSpaceId":"sitesp_yoSgU","description":"10 Steps to a shell on OSCP-like stack-based buffer overflows.","breadcrumbs":[{"label":"OSCP"}]},{"id":"-MWdKOB4yT0J6K4tlzg0","title":"OSCP - Things to Try When Stuck","pathname":"/oscp/oscp-things-to-try-when-stuck","siteSpaceId":"sitesp_yoSgU","description":"Stuck on a box? Try the ideas below I learned from OSCP practice boxes.","breadcrumbs":[{"label":"OSCP"}]},{"id":"-MQ8jw3xvl2Fy9yUHwip","title":"Log Analysis Part 1: Using Fast Reverse Proxy (FRP) to Expose Logging Infrastructure","pathname":"/web-server-log-analysis/using-fast-reverse-proxy-frp-to-expose-logging-infrastructure","siteSpaceId":"sitesp_yoSgU","description":"2020-05-04","breadcrumbs":[{"label":"Web Server Log Analysis"}]},{"id":"-MQ8l9lay9b3lYPQQEA_","title":"Log Analysis Part 2: Using Logstash’s Grok Filter to Parse Docker Nginx Logs","pathname":"/web-server-log-analysis/using-logstashs-grok-filter-to-parse-docker-nginx-logs","siteSpaceId":"sitesp_yoSgU","description":"2020-05-11","breadcrumbs":[{"label":"Web Server Log Analysis"}]},{"id":"-MQ8o23XOeETV2sTEEzB","title":"Log Analysis Part 3: Using Greynoise with Logstash","pathname":"/web-server-log-analysis/using-greynoise-with-logstash","siteSpaceId":"sitesp_yoSgU","description":"2020-06-15","breadcrumbs":[{"label":"Web Server Log Analysis"}]},{"id":"-MQ8xrbjPPcbIy2z9PC8","title":"Using Cloudflare Page Rules to Point a Root Domain to a GitBook Site","pathname":"/miscellaneous-articles/using-cloudflare-page-rules-to-point-a-root-domain-to-a-gitbook-site","siteSpaceId":"sitesp_yoSgU","description":"2021-01-03","breadcrumbs":[{"label":"Miscellaneous Articles"}]},{"id":"-MQ8hBHI6GNbBs80QEok","title":"How to Secure the Ghost Blogging Platform","pathname":"/miscellaneous-articles/how-to-secure-the-ghost-blogging-platform","siteSpaceId":"sitesp_yoSgU","description":"2020-04-27","breadcrumbs":[{"label":"Miscellaneous Articles"}]},{"id":"-MQ8fp7-0CHw_qrA62MP","title":"An Overview of Apple and Google's Privacy-Preserving Contact Tracing Framework","pathname":"/miscellaneous-articles/apple-and-googles-privacy-preserving-contact-tracing-framework","siteSpaceId":"sitesp_yoSgU","description":"2020-04-20","breadcrumbs":[{"label":"Miscellaneous Articles"}]},{"id":"-MQ8dmqFBB2LL2v6FCRk","title":"Active Directory Deception Technology","pathname":"/miscellaneous-articles/active-directory-deception-technology","siteSpaceId":"sitesp_yoSgU","description":"2020-04-01","breadcrumbs":[{"label":"Miscellaneous Articles"}]}]}