top of page
Search


3 Wireless Security Myths
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...

Div0 Blog Editor
May 27, 20131 min read


Malware Hunting with Sysinternals Tools
In this video, Mark Russinovich demonstrates how you can find and remove malware (e.g. Stuxnet and Flame) using Sysinternals tools. Some...

Div0 Blog Editor
May 26, 20131 min read


Understanding & Reading Packets
Reading packets can be invaluable to security professionals. Especially when trying to understand how NIDS/NIPS or other packet filtering...

Div0 Blog Editor
Mar 16, 20132 min read


Hacking Made Too Easy
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...

Div0 Blog Editor
Feb 9, 20132 min read


Safe PenTesting with Metasploit
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...

Div0 Blog Editor
Jan 16, 20131 min read


Evolution of Online Security Tokens & its Impact
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...

Div0 Blog Editor
Dec 25, 20124 min read


Detecting Packet Sniffing
One main factor that contributes to the high success rate of a persistent attack is the “low-and-slow” approach. Detecting passive...

Div0 Blog Editor
Nov 10, 20121 min read


Client Puzzle Protocol (CPP)
Client Puzzle Protocol (CPP) is a proof-of-concept, in the late 1990s and early 2000s, to defend against denial-of-service (DoS) attacks....

Div0 Blog Editor
Oct 30, 20121 min read


A Day at GovWare 2012
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...

Div0 Blog Editor
Oct 3, 20123 min read


Powershell Injection Using SET
At this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose...

Div0 Blog Editor
Sep 13, 20122 min read


WPA — Password is its Weakest Link
The WPA/WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even...

Div0 Blog Editor
Aug 30, 20122 min read


Introduction to Intrusion Detection Systems (IDSes)
Information security protection measures are generally broken down into 3 high-level processes: Prevent: Prevent your information assets...

Div0 Blog Editor
Aug 28, 20125 min read


WiFi Pineapple — First Impression
Here is the review of the WiFi pineapple. Because there are simply too many awesome avenues to explore on the WiFi Pineapple I will touch...

Div0 Blog Editor
Aug 20, 20128 min read


Pineapple has arrived. & Quick Peek on Throwing Star.
The much-anticipated hardware has landed on my doorstep today! So what is WiFi Pineapple? Visit: https://wifipineapple.com/. This Package...

Div0 Blog Editor
Aug 14, 20122 min read


Armitage — Metasploit Made Easy
Introduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....

Div0 Blog Editor
Aug 9, 20122 min read


Introduction to SSL
The Little Padlock "Make sure you see the little padlock icon to verify you are accessing online banking services or e-commerce websites...

Div0 Blog Editor
Jul 15, 20123 min read


Introduction to iptables
netfilter/iptables is a de facto IP packet filtering tool used in Linux operating system (OS). iptables provides features for system...

Div0 Blog Editor
Jun 2, 20126 min read


Honeytrap
Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...

Div0 Blog Editor
May 30, 20122 min read


Ransomware: The Digital Kidnap
In the recent variant of Zeus Botnet, a ransomware feature was added. What is Ransomware? Ransomware is a unique class of malware. Its...

Div0 Blog Editor
May 28, 20123 min read


Cyber Place
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...

Div0 Blog Editor
May 12, 20123 min read
BLOG: Blog2
bottom of page
