<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-four/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/hardware/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/iot/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/post/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/</loc>
    <lastmod>2019-08-27T16:10:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-three/</loc>
    <lastmod>2019-08-27T15:53:09+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-two/</loc>
    <lastmod>2019-08-27T14:23:39+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2019/08/27/exploiting-the-eques-elf-smart-plug-part-one/</loc>
    <lastmod>2019-08-27T11:57:50+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/vpn/</loc>
    <lastmod>2017-12-28T16:44:50+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2017/12/28/wireguard-vpn-portable-raspberry-pi-setup/</loc>
    <lastmod>2017-12-28T16:44:50+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2017/12/28/wireguard-vpn-chained-setup/</loc>
    <lastmod>2017-12-28T07:33:38+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2017/11/14/wireguard-vpn-typical-setup/</loc>
    <lastmod>2017-11-14T07:51:06+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2017/11/12/vpns-an-opsec-primer/</loc>
    <lastmod>2017-11-12T12:05:24+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/radio/</loc>
    <lastmod>2017-06-28T18:30:35+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2017/06/28/the-2017-africahackon-conference-badge/</loc>
    <lastmod>2017-06-28T18:30:35+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2016/12/29/receiving-outernet-satellite-broadcasts/</loc>
    <lastmod>2016-12-29T10:18:31+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2016/07/09/hijacking-wireless-mice-and-keyboards/</loc>
    <lastmod>2016-07-09T14:40:38+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2016/02/16/a-diy-listening-device/</loc>
    <lastmod>2016-02-16T19:51:44+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2016/01/25/gsm-sniffing-voice-traffic/</loc>
    <lastmod>2016-01-25T06:51:00+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/11/29/gsm-sniffing-sms-traffic/</loc>
    <lastmod>2015-11-29T10:14:48+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/11/01/sniffing-gsm-traffic/</loc>
    <lastmod>2015-11-01T09:30:27+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/10/17/christian/</loc>
    <lastmod>2015-10-17T11:40:08+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/the-setup/</loc>
    <lastmod>2015-10-17T11:40:08+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/10/11/the-hackrf-one-first-steps/</loc>
    <lastmod>2015-10-11T20:18:10+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/ramblings/</loc>
    <lastmod>2015-10-04T09:06:09+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/10/04/saints-and-outlaws/</loc>
    <lastmod>2015-10-04T09:06:09+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/network-security/</loc>
    <lastmod>2015-09-17T20:54:07+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/09/17/the-bro-chronicles-2/</loc>
    <lastmod>2015-09-17T20:54:07+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/09/13/hackers-wanted/</loc>
    <lastmod>2015-09-13T11:31:27+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/09/06/the-bro-chronicles-1/</loc>
    <lastmod>2015-09-06T08:56:06+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/08/25/learning-to-hack/</loc>
    <lastmod>2015-08-25T14:27:24+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/05/17/africahackon-be-part-of-the-story/</loc>
    <lastmod>2015-05-17T08:42:08+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/05/11/crypto-magic-homomorphic-encryption/</loc>
    <lastmod>2015-05-11T13:45:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/tags/cryptography/</loc>
    <lastmod>2015-05-11T13:45:52+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/05/05/crypto-magic-zero-knowledge/</loc>
    <lastmod>2015-05-05T09:23:11+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/04/27/bright/</loc>
    <lastmod>2015-04-27T08:01:00+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/04/20/jade/</loc>
    <lastmod>2015-04-20T06:34:17+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/blog/2015/03/14/ck-the-setup/</loc>
    <lastmod>2015-03-14T19:46:34+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/whoami/</loc>
    <lastmod>2014-10-09T12:48:00+03:00</lastmod>
  </url><url>
    <loc>https://www.ckn.io/categories/</loc>
  </url>
</urlset>
