Published inCSG @ GovTechHow we discovered zero-day vulnerabilities in Riverbed Software AgentSharing of three vulnerabilities we uncovered and how we identified the codes that allowed the vulnerabilities to occur.Mar 10, 2022Mar 10, 2022
Published inCSG @ GovTechProxy Agent — a tool for mobile penetration testers!Proxy Agent streamlines your security testing flow by automating the the proxy-setting process on debugging tools such as Burp SuiteDec 1, 2021A response icon2Dec 1, 2021A response icon2
Published inCSG @ GovTechGuide to improve the security posture of Bluetooth Low Energy-enabled applicationsA guide on common BLE attacks targeting connection and advertising modes, and how BLE can be secured from these attacksMay 5, 2021May 5, 2021
Published inCSG @ GovTechHackTheBox Write up — ForestArticle focuses on how to identify AD misconfiguration and exploit it using the bloodhound and impacket toolNov 12, 2020Nov 12, 2020
Published inCSG @ GovTechHacking a computer using ArduinoIntroducing Arduino’s basic functions, EEPROM, serial communication, USB Rubber Ducky and Powershell scriptingJul 22, 2020A response icon1Jul 22, 2020A response icon1