top of page

Tiny Honeypot (THP)

Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...

ARP Poisoning Using Ettercap-NG

Many Internet users know that devices/machines on networks are identified using IP addresses. But if you're familiar with the ISO/IEC...

JTR WPA Wordlist

John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...

How would you Classify an APT?

GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...

Need Privacy?

Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on...

Wireless Channel Hopping

Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...

Antennas, Gain & Security

One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...

Introduction to Wi-Fi

Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...

WEP (In)Security

In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...

Playing with Human Emotions

Just because you are an ordinary employee in a company does not make you "invaluable". Whatever information you have on your company that...

What Is Trust?

I’ve been pondering about this, perhaps some people can shed some light. When social engineers succeed in their engagements, it usually...

BLOG: Blog2
bottom of page