top of page
Search
Div0 Blog Editor
May 27, 20131 min read
3 Wireless Security Myths
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...
5 views0 comments
Div0 Blog Editor
May 26, 20131 min read
Malware Hunting with Sysinternals Tools
In this video, Mark Russinovich demonstrates how you can find and remove malware (e.g. Stuxnet and Flame) using Sysinternals tools. Some...
41 views0 comments
Div0 Blog Editor
Mar 16, 20132 min read
Understanding & Reading Packets
Reading packets can be invaluable to security professionals. Especially when trying to understand how NIDS/NIPS or other packet filtering...
95 views0 comments
Div0 Blog Editor
Feb 9, 20132 min read
Hacking Made Too Easy
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...
18 views0 comments
Div0 Blog Editor
Jan 16, 20131 min read
Safe PenTesting with Metasploit
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...
39 views0 comments
Div0 Blog Editor
Dec 25, 20124 min read
Evolution of Online Security Tokens & its Impact
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...
60 views0 comments
Div0 Blog Editor
Nov 10, 20121 min read
Detecting Packet Sniffing
One main factor that contributes to the high success rate of a persistent attack is the “low-and-slow” approach. Detecting passive...
50 views0 comments
Div0 Blog Editor
Oct 30, 20121 min read
Client Puzzle Protocol (CPP)
Client Puzzle Protocol (CPP) is a proof-of-concept, in the late 1990s and early 2000s, to defend against denial-of-service (DoS) attacks....
75 views0 comments
Div0 Blog Editor
Oct 3, 20123 min read
A Day at GovWare 2012
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...
11 views0 comments
Div0 Blog Editor
Sep 13, 20122 min read
Powershell Injection Using SET
At this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose...
95 views0 comments
Div0 Blog Editor
Aug 30, 20122 min read
WPA — Password is its Weakest Link
The WPA/WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even...
21 views0 comments
Div0 Blog Editor
Aug 28, 20125 min read
Introduction to Intrusion Detection Systems (IDSes)
Information security protection measures are generally broken down into 3 high-level processes: Prevent: Prevent your information assets...
34 views0 comments
Div0 Blog Editor
Aug 20, 20128 min read
WiFi Pineapple — First Impression
Here is the review of the WiFi pineapple. Because there are simply too many awesome avenues to explore on the WiFi Pineapple I will touch...
282 views0 comments
Div0 Blog Editor
Aug 14, 20122 min read
Pineapple has arrived. & Quick Peek on Throwing Star.
The much-anticipated hardware has landed on my doorstep today! So what is WiFi Pineapple? Visit: https://wifipineapple.com/. This Package...
17 views0 comments
Div0 Blog Editor
Aug 9, 20122 min read
Armitage — Metasploit Made Easy
Introduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....
193 views0 comments
Div0 Blog Editor
Jul 15, 20123 min read
Introduction to SSL
The Little Padlock "Make sure you see the little padlock icon to verify you are accessing online banking services or e-commerce websites...
20 views0 comments
Div0 Blog Editor
Jun 2, 20126 min read
Introduction to iptables
netfilter/iptables is a de facto IP packet filtering tool used in Linux operating system (OS). iptables provides features for system...
156 views0 comments
Div0 Blog Editor
May 30, 20122 min read
Honeytrap
Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...
143 views0 comments
Div0 Blog Editor
May 28, 20123 min read
Ransomware: The Digital Kidnap
In the recent variant of Zeus Botnet, a ransomware feature was added. What is Ransomware? Ransomware is a unique class of malware. Its...
24 views0 comments
Div0 Blog Editor
May 12, 20123 min read
Cyber Place
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...
8 views0 comments
BLOG: Blog2
bottom of page