Open in app

Sign In

Write

Sign In

Kang Hao
Kang Hao

27 Followers

Home

About

Published in CSG @ GovTech

·Mar 10, 2022

How we discovered zero-day vulnerabilities in the Riverbed Software Agent

In November 2021, my teammates, Darrel Huang, Bjorn Lim, and I worked together to research the Riverbed SteelCentral AppInternals Agent software and its security posture. During our research, we found a variety of vulnerabilities that would have allowed an attacker to fully compromise and take over the Agent server. Riverbed…

Govtech

13 min read

How we discovered zero-day vulnerabilities in Riverbed Software Agent
How we discovered zero-day vulnerabilities in Riverbed Software Agent
Govtech

13 min read


Published in CSG @ GovTech

·Dec 1, 2021

Proxy Agent — a tool for mobile penetration testers!

Introduction Earlier in March this year, we introduced Autowasp — A Burp Suite extension that integrates Burp issues logging with OWASP’s Web Security Testing Guide (WSTG) to streamline the security testing flow for penetration testers, particularly those working on web applications. We are glad to announce a new application we have…

Mobile Security

7 min read

Proxy Agent — a tool for mobile penetration testers!
Proxy Agent — a tool for mobile penetration testers!
Mobile Security

7 min read


Published in CSG @ GovTech

·May 5, 2021

Guide to improve the security posture of Bluetooth Low Energy-enabled applications

What is Bluetooth Low Energy (BLE) BLE — also known as Bluetooth Smart — is a variant of Bluetooth Classic technology and is widely used by the Internet-of-Things (IoT) devices, smart home appliances and mobile phones (henceforth referred to as BLE devices in the article). Notably, the use cases for BLE and Classic are very different…

Bluetooth Low Energy

5 min read

Guide to improve the security posture of Bluetooth Low Energy-enabled applications
Guide to improve the security posture of Bluetooth Low Energy-enabled applications
Bluetooth Low Energy

5 min read


Published in CSG @ GovTech

·Nov 12, 2020

HackTheBox Write-up — Forest

Today, almost 90% of Global Fortune 1000 companies use Active directory (AD) for authentication and authorisation purposes, which has made AD the first place to target for cyber-attacks. The results of attacks on AD are often the misconfiguration of accounts/groups that allows for privilege escalation. In this write-up, I will…

Active Directory

10 min read

HackTheBox Write up — Forest
HackTheBox Write up — Forest
Active Directory

10 min read


Published in CSG @ GovTech

·Jul 22, 2020

Hacking a computer using Arduino

Imagine this scenario… You get the picture — In this article, I will explain how I hacked into someone’s computer that was left unlocked while s/he was on a quick toilet break. [Caveat: I…

Cybersecurity

9 min read

Hacking a computer using Arduino
Hacking a computer using Arduino
Cybersecurity

9 min read

Kang Hao

Kang Hao

27 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech