Dear Offsec, I’ve never quite felt such a magnitude of ph33r in any examination so far, but the thought of facing a L100 behemoth for 48 hours in a week’s time is frightening indeed. I was a L10 servant in infosec before the AWAE course, and now I’m barely a L30 archer. Spending countless days…
The “Irrational” Human?: Part 3
(Warning: A slightly long read. I have wanted to write about doctrine for the longest of times, but I decided to weave in some of my personal musings about other areas of cybersecurity as well, that are related to doctrine. The result is a long story.) Introduction: The Thought on Business A number of friends…
Some National Day Reflections
(This isn’t a cybersecurity blog post. This is just some thoughts of a patriotic citizen on National Day.) I remembered ever writing my thoughts when the late LKY passed away in 2015 in a post as part of being a socio-political writer. Those were times when, as a student, one could flirt with many different…
The “Irrational” Human?: Part 2
“Minimum 8 characters, minimum 1 upper case, 1 lower case, 1 number and 1 special character.” Sounds familiar? Yes, this is a fairly common password policy. Users found the shortest password that could meet these requirements, “P@ssw0rd” and used it so widely that one of the biggest data breaches in Singapore documented how the use…
The “Irrational” Human?: Part 1
Recently, I finished reading a book at the intersection of behavioural economics and psychology, and will be embarking on yet another book on behavioural economics. For someone who graduated from a hard science degree, I think this qualifies as “reading some fluff” to pass time. They make for interesting reads to suggest that humans are…
Cyber 101 with Bitcrafts!
Is cybersecurity merely only for technically gifted people? Well, not quite. With the advent of the digital world (think Smart Nation), there has been an increasing need for cyber literacy and awareness. Yet, there exists a gap between cyber professionals and laypeople in terms of cyber awareness and literacy. Hence, one short way of addressing…
(Off-Topic): A Travel Review on Cathay Pacific
(For those who want to read purely about cybersecurity or the digital world, oops, this time round it’s more of a self-indulgent post. Sorry!) Recently I had the fortune of trying Cathay Pacific (with some friend recommendations) and because it was a whooping $10 cheaper than Thai Airways and Singapore Airlines that fly the same…
Building Vulnerable Machines: Part 3 — JOY is More Than One (Machine)
(If you have not read Part 2, please click here.) Let us now extend what we did in Parts 1 and 2 to more than one machine. After all, one machine teaches one set of skills; multiple machines can cover a range of skills. This, in effect, is building a cyber range. Before we jump…
A Distraction: Thinking About Cybersecurity 101
While preparing for a cybersecurity 101 community talk that I would give in the next month as part of a volunteer community outreach programme, I felt somewhat concerned about how far behind the layperson is in catching up with the digital world. I never expecting doing cybersecurity half a decade ago. Then, I was an…
Building Vulnerable Machines: Part 2 — A TORMENT of a Journey
(If you have not read Part 1, you should have a look at it here.) DISCLAIMER: If you would like to try the TORMENT machine and root it (this is currently pending Vulnhub publication), please download a copy of the machine here. Do NOT read beyond this disclaimer because this will be a full post…