top of page
Search


Tiny Honeypot (THP)
Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...

Div0 Blog Editor
Apr 30, 20122 min read


ARP Poisoning Using Ettercap-NG
Many Internet users know that devices/machines on networks are identified using IP addresses. But if you're familiar with the ISO/IEC...

Div0 Blog Editor
Apr 9, 20122 min read


Netcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the...

Div0 Blog Editor
Nov 30, 20117 min read


JTR WPA Wordlist
John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...

Div0 Blog Editor
Nov 18, 20111 min read


How would you Classify an APT?
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...

Div0 Blog Editor
Sep 28, 20112 min read


Common Criteria — An Interview with Jussipekka Leiwo
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...

Div0 Blog Editor
Aug 12, 20118 min read


Need Privacy?
Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on...

Div0 Blog Editor
Jul 14, 20111 min read


Wi-Fi–Hacking Neighbour From Hell Sentenced to 18 Years – Please do not be one of them!
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term for unleashing a vendetta of...

Div0 Blog Editor
Jul 14, 20112 min read


802.11 Network Security – Tools of the Trade
I thought why not shed some light on the tools that I have been using to play with the Wi-Fi networks around me. Hopefully, we can get...

Div0 Blog Editor
Jun 30, 20114 min read


Wireless Channel Hopping
Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...

Div0 Blog Editor
Jun 6, 20111 min read


Antennas, Gain & Security
One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...

Div0 Blog Editor
May 12, 20111 min read


Introduction to Wi-Fi
Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...

Div0 Blog Editor
May 12, 20111 min read


WEP (In)Security
In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...

Div0 Blog Editor
Mar 12, 20112 min read


Playing with Human Emotions
Just because you are an ordinary employee in a company does not make you "invaluable". Whatever information you have on your company that...

Div0 Blog Editor
Mar 3, 20112 min read


Defining Advanced Persistent Threat (APT)
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...

Div0 Blog Editor
Feb 19, 20111 min read


What Is Trust?
I’ve been pondering about this, perhaps some people can shed some light. When social engineers succeed in their engagements, it usually...

Div0 Blog Editor
Feb 2, 20111 min read
BLOG: Blog2
bottom of page
