Stealing code

Much of client side web technology today runs directly from source, E.g. HTML/CSS/JS... , which means source code is readily available to anyone who wants it, a far cry from software where source code is often kept tightly under wraps. As such, it is very simple to just ...

Key management

Over time I have gradually accumulated quite a number of keys. I have my PGP keys for my mail encryptions, my SSH keys, multiple VPN certs and keys for various services, my android keystore keys. Currently I just chuck it into a folder, storing everything in plain text, which is ...

Spoofing NUS WPA2 and stealing credentials

Warning Content in this post is for educational purposes only, it may be illegal to carry out the exploit mentioned. The author is not responsible for any action taken against you if you carry it out. This exploit is possible because of configuration settings in PEAP where certificate validation is ...

Dual booting

Barely one month after getting rid of my Ubuntu/Win 7 dual boot combination, I installed linux on my laptop once again. This time though, its Kali Linux, because using Backtrack in a VM was creating more trouble than it was worth. I guess having a separate OS only for ...

Hacking attempt on cubie

While looking through apache logs today, I found a few interesting entries. `123.45.678.9 - - [02/Jun/2013:17:42:10 +0800] "GET /sdk/../../../../../..//etc/vmware/hostd/vmInventory.xml HTTP/1.1" 404 1105` `123.45.678.9 - - [02/Jun/2013:17:42:11 +0800] "GET /sdk/%2E%2E ...

Orbital Project Log

Project Log - Benjamin Week Description Hours 1 Liftoff Workshop 16 1 Analyse giftbook and convert it into nusmods 5 1 Write and run script to wget and parse module information 8 1 Implement REST interface 2 1 Hack Android app to connect over REST interface 2 1 Upload module info ...