Div0 Blog EditorFeb 18, 20175 minEver Famous DDoS AttacksReally simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software vulner...
Div0 Blog EditorDec 7, 20164 minSimulated PhishingAfter a recent simulated phishing exercise, we received a number of questions on how the emails were sent and how my team managed to craf...
Div0 Blog EditorNov 26, 20165 minStaying Ahead of Phishing EmailsAn individual’s lack of awareness and ability to identify social engineering attacks can lead to a security breach or financial loss. He...
Div0 Blog EditorOct 15, 20162 minLearning Obstacles in the Capture-The-Flag (CTF) ModelAlthough my Diploma in Infocomm Security Management with the Singapore Polytechnic laid a good foundation to get me started in cybersecur...
Div0 Blog EditorSep 3, 20161 minN.E.mation! 11 Sharing Session3 Sep 2016 — Div0 Crew Emil Tan shared insights on cybersecurity in the context of Total Defence to the Top 100 N.E.mation! 11 participat...
Div0 Blog EditorAug 13, 20163 minCVE-2011-2894Background According to CVE, Spring Framework has security restrictions as one serialise an object, but does not have any security restri...
Div0 Blog EditorAug 4, 20163 minKippo — Ion (BruteForce Lab) EditionNote: This is an add-on post on top of my Kippo write-up. Kippo2MySQL Kippo2MySQL is a simple piece of script that extracts some very bas...
Div0 Blog EditorJul 16, 20163 minCymmetria's MazeRunner (A Quick Look)Quite a lot of people whom I’m following on Twitter were talking about the release of MazeRunner Community Edition, so I decided to check...
Div0 Blog EditorJul 15, 20164 minImposing & Enforcing Global MandatesWhile the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved questio...
Div0 Blog EditorMay 20, 20163 minFrom Russia With LoveIn the world of cybersecurity and imposed concept of security, 2 mundane vulnerabilities have been looming around for years. Nobody seeme...
Div0 Blog EditorMar 26, 20163 minKippo – A SSH Honeypot (Updated)Update Note Cowrie – a (relatively) new SSH honeypot – has been my obsession for the week. I took a quick first glimpse at Cowrie, and I ...
Div0 Blog EditorMar 26, 20162 minCowrie – A SSH Honeypot (A Quick Glimpse)Cowrie – written by Michel Oosterhof – is a medium interaction SSH honeypot designed to log brute force attacks and shell interactions pe...
Div0 Blog EditorFeb 4, 20163 minMyth & Revival of National Security — Anyone?Under the umbrella of cybersecurity, it has become more and more common and accepted to discuss national security and indeed push forward...
Div0 Blog EditorFeb 4, 20163 minUK Investigatory Bill EmergingOne of the most thrilling developments in the privacy and security world is the ongoing drafting of the UK Investigatory Bill. That will ...
Div0 Blog EditorDec 13, 20155 minDangerous Coffee ShopPublic spaces are dangerous, are they not? At least many cyber training programmes declare that coffee shops are the most dangerous when ...
Div0 Blog EditorNov 18, 20154 minConstructing a New Silk RoadAt the end of March 2015, the Ministry of Commerce of the People’s Republic of China announced the publication of a manifesto to put new ...
Div0 Blog EditorSep 16, 20151 minStaying Connected to a Broken Wi-Fi AP (Mac OS X)Whilst this is not strictly a cybersecurity-related snippet, it might still be an interesting curiosity for someone working on that field...
Div0 Blog EditorSep 4, 20153 minThe Olympic Games for Cybersecurity — Feeding Up the National Pride & ConfrontationAre the processes of digitalisation of the society and eGovernance all been hijacked by the militarised cyber junta? In some sense, one c...
Div0 Blog EditorSep 3, 20152 minChauvinistic Cyber-Nationalism & Contemporary World PoliticsConsidering the recent events and indeed the ongoing globalisation of not only industrial components, like it used to be, but mere people...
Div0 Blog EditorJun 14, 20151 minTiny Tool to Watch Out for ARP PoisoningRecently I created a simple script for someone to watch out for malicious, or just any, ARP changes in their local cache. The script just...