top of page
Search


PHP Type Juggling Vulnerability Tech Sharing + Challenge
We start off our 1st Div0 Women In Cybersecurity (WICS) technical sharing with our WICS member — Monika Talekar — organising a 2-day...

Div0 Blog Editor
May 31, 20202 min read
704 views
0 comments


Not So Lucky Draw
11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...

Div0 Blog Editor
Sep 5, 20174 min read
797 views
0 comments


Sending Spam SMSes via a Free WiFi Service
Wireless@SG is a nation-wide free WiFi service in Singapore. To get Internet access from a Wireless@SG hotspot, a user has to register...

Div0 Blog Editor
Aug 3, 20176 min read
323 views
0 comments


Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...

Div0 Blog Editor
May 8, 20175 min read
17 views
0 comments


12th Day of Christmas: Browser Exploitation Framework (BeEF)
On the 12th Day of Christmas, Div0 gave to me ... Browser Exploitation Framework (BeEF), theHarvester, nmap Scripting Engine (NSE),...

Div0 Blog Editor
Jan 5, 20152 min read
56 views
0 comments


7th Day of Christmas: urlcrazy
On the 7th Day of Christmas, Div0 gave to me ... urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash...

Div0 Blog Editor
Dec 31, 20141 min read
18 views
0 comments


6th Day of Christmas: recon-ng
On the 6th Day of Christmas, Div0 gave to me ... recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash Identification,...

Div0 Blog Editor
Dec 30, 20141 min read
28 views
0 comments


1st Day of Christmas: CeWL
It's December! We will be celebrating 12 days of Christmas Div0 Style. For the next 12 days, we will be making a post each day on a...

Div0 Blog Editor
Dec 25, 20141 min read
9 views
0 comments


A Security Incident Explained as it Happened (Roughly)
It is a nightmare for anyone running an Internet-facing information system when customers inform you that something strange going on. At...

Div0 Blog Editor
Nov 19, 20143 min read
12 views
0 comments


Primitive Defence against Good Old cURL Scanning Attack
One of the founding weaknesses in the HTTP protocol was the binding of file systems directly to URL paths. At the time of Gopher and the...

Div0 Blog Editor
Nov 13, 20143 min read
10 views
0 comments


NISEC: Zero Day Defence 2014 — What Went On
Zero Day Defence 2014 is one of the few components in Singapore's National Infocomm Security Competition (NISEC). The task is to create a...

Div0 Blog Editor
Jul 8, 20146 min read
14 views
0 comments


Glastopf – A Web-Application Honeypot
According to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of...

Div0 Blog Editor
Apr 22, 20143 min read
523 views
0 comments


Thug – A Client Honeypot
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Div0 Blog Editor
Feb 7, 20145 min read
1,299 views
0 comments


Introduction to SSL
The Little Padlock "Make sure you see the little padlock icon to verify you are accessing online banking services or e-commerce websites...

Div0 Blog Editor
Jul 15, 20123 min read
20 views
0 comments
BLOG: Blog2
bottom of page