3 Wireless Security Myths
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...
In this video, Mark Russinovich demonstrates how you can find and remove malware (e.g. Stuxnet and Flame) using Sysinternals tools. Some...
Reading packets can be invaluable to security professionals. Especially when trying to understand how NIDS/NIPS or other packet filtering...
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...
When I received my new token from DBS I thought, “this is almost as thin as my credit card”. Today my credit card can also be my security...
One main factor that contributes to the high success rate of a persistent attack is the “low-and-slow” approach. Detecting passive...
Client Puzzle Protocol (CPP) is a proof-of-concept, in the late 1990s and early 2000s, to defend against denial-of-service (DoS) attacks....
GovWare was not quite the same this year ... But, the usual discussion on Advanced Persistent Threat (APT) ran its course. Not only is it...
At this year's BSides Cleveland and BSides Las Vegas, Dave Kennedy (ReL1K) presented "Secret Pentesting Techniques Shhh...". The purpose...
The WPA/WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even...
Information security protection measures are generally broken down into 3 high-level processes: Prevent: Prevent your information assets...
Here is the review of the WiFi pineapple. Because there are simply too many awesome avenues to explore on the WiFi Pineapple I will touch...
The much-anticipated hardware has landed on my doorstep today! So what is WiFi Pineapple? Visit: https://wifipineapple.com/. This Package...
Introduction I am sure anyone who does penetration testing or is active in the security field knows what Metasploit is, and what it does....
The Little Padlock "Make sure you see the little padlock icon to verify you are accessing online banking services or e-commerce websites...
netfilter/iptables is a de facto IP packet filtering tool used in Linux operating system (OS). iptables provides features for system...
Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...
In the recent variant of Zeus Botnet, a ransomware feature was added. What is Ransomware? Ransomware is a unique class of malware. Its...
A year ago, I presented Securing the World of Avatar at SyScan Singapore. It's a lightning talk about a brief thought I had when I was...