top of page
Search
Div0 Blog Editor
May 31, 20202 min read
PHP Type Juggling Vulnerability Tech Sharing + Challenge
We start off our 1st Div0 Women In Cybersecurity (WICS) technical sharing with our WICS member — Monika Talekar — organising a 2-day...
697 views0 comments
Div0 Blog Editor
Sep 5, 20174 min read
Not So Lucky Draw
11 August 2017 — I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned...
792 views0 comments
Div0 Blog Editor
Aug 3, 20176 min read
Sending Spam SMSes via a Free WiFi Service
Wireless@SG is a nation-wide free WiFi service in Singapore. To get Internet access from a Wireless@SG hotspot, a user has to register...
299 views0 comments
Div0 Blog Editor
May 8, 20175 min read
Shields Up! Wild West of the Cyberspace
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various...
16 views0 comments
Div0 Blog Editor
Jan 5, 20152 min read
12th Day of Christmas: Browser Exploitation Framework (BeEF)
On the 12th Day of Christmas, Div0 gave to me ... Browser Exploitation Framework (BeEF), theHarvester, nmap Scripting Engine (NSE),...
51 views0 comments
Div0 Blog Editor
Dec 31, 20141 min read
7th Day of Christmas: urlcrazy
On the 7th Day of Christmas, Div0 gave to me ... urlcrazy, recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash...
17 views0 comments
Div0 Blog Editor
Dec 30, 20141 min read
6th Day of Christmas: recon-ng
On the 6th Day of Christmas, Div0 gave to me ... recon-ng, Zone Transfer Tool, Using Online Digest Databases, Hash Identification,...
27 views0 comments
Div0 Blog Editor
Dec 25, 20141 min read
1st Day of Christmas: CeWL
It's December! We will be celebrating 12 days of Christmas Div0 Style. For the next 12 days, we will be making a post each day on a...
9 views0 comments
Div0 Blog Editor
Nov 19, 20143 min read
A Security Incident Explained as it Happened (Roughly)
It is a nightmare for anyone running an Internet-facing information system when customers inform you that something strange going on. At...
12 views0 comments
Div0 Blog Editor
Nov 13, 20143 min read
Primitive Defence against Good Old cURL Scanning Attack
One of the founding weaknesses in the HTTP protocol was the binding of file systems directly to URL paths. At the time of Gopher and the...
9 views0 comments
Div0 Blog Editor
Jul 8, 20146 min read
NISEC: Zero Day Defence 2014 — What Went On
Zero Day Defence 2014 is one of the few components in Singapore's National Infocomm Security Competition (NISEC). The task is to create a...
10 views0 comments
Div0 Blog Editor
Apr 22, 20143 min read
Glastopf – A Web-Application Honeypot
According to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of...
469 views0 comments
Div0 Blog Editor
Feb 7, 20145 min read
Thug – A Client Honeypot
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...
1,271 views0 comments
Div0 Blog Editor
Jul 15, 20123 min read
Introduction to SSL
The Little Padlock "Make sure you see the little padlock icon to verify you are accessing online banking services or e-commerce websites...
20 views0 comments
BLOG: Blog2
bottom of page