top of page
Search
Div0 Blog Editor
Apr 30, 20122 min read
Tiny Honeypot (THP)
Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...
464 views0 comments
Div0 Blog Editor
Apr 9, 20122 min read
ARP Poisoning Using Ettercap-NG
Many Internet users know that devices/machines on networks are identified using IP addresses. But if you're familiar with the ISO/IEC...
142 views0 comments
Div0 Blog Editor
Nov 30, 20117 min read
Netcat – The Swiss Army Knife of Networking
1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the...
1,567 views0 comments
Div0 Blog Editor
Nov 18, 20111 min read
JTR WPA Wordlist
John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First, we must understand that using a word list is...
74 views0 comments
Div0 Blog Editor
Sep 28, 20112 min read
How would you Classify an APT?
GovWare 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise...
16 views0 comments
Div0 Blog Editor
Aug 12, 20118 min read
Common Criteria — An Interview with Jussipekka Leiwo
How much do you know about Common Criteria (CC)? It is a deep-tech domain not widely taught nor explored in many courses of study in...
68 views0 comments
Div0 Blog Editor
Jul 14, 20111 min read
Need Privacy?
Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on...
8 views0 comments
Div0 Blog Editor
Jul 14, 20112 min read
Wi-Fi–Hacking Neighbour From Hell Sentenced to 18 Years – Please do not be one of them!
A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term for unleashing a vendetta of...
30 views0 comments
Div0 Blog Editor
Jun 30, 20114 min read
802.11 Network Security – Tools of the Trade
I thought why not shed some light on the tools that I have been using to play with the Wi-Fi networks around me. Hopefully, we can get...
73 views0 comments
Div0 Blog Editor
Jun 6, 20111 min read
Wireless Channel Hopping
Ever wondered how your devices like your laptop get the list of wireless networks available? First, you have to understand that at any...
18 views0 comments
Div0 Blog Editor
May 12, 20111 min read
Antennas, Gain & Security
One of the common misconceptions that people tend to have is that higher gain is better. This results in people blindly buying the...
15 views0 comments
Div0 Blog Editor
May 12, 20111 min read
Introduction to Wi-Fi
Wi-Fi (Wireless Fidelity) came about in 1999 and has gained popularity to over 700 million people and over 750,000 hotspots all around...
10 views0 comments
Div0 Blog Editor
Mar 12, 20112 min read
WEP (In)Security
In cryptography, it is a bad practice to use the same encryption key to encrypt every single packets/data. If Eve the eavesdropper has a...
37 views0 comments
Div0 Blog Editor
Mar 3, 20112 min read
Playing with Human Emotions
Just because you are an ordinary employee in a company does not make you "invaluable". Whatever information you have on your company that...
10 views0 comments
Div0 Blog Editor
Feb 19, 20111 min read
Defining Advanced Persistent Threat (APT)
Just mention APT in your presentation/product, people will come and listen to you. A passing remarked I received from my friend when I...
5 views0 comments
Div0 Blog Editor
Feb 2, 20111 min read
What Is Trust?
I’ve been pondering about this, perhaps some people can shed some light. When social engineers succeed in their engagements, it usually...
21 views0 comments
BLOG: Blog2
bottom of page