OWASP Juice Shop: Database Schema
Challenge: Database Schema Difficulty : 3 Star Description: Exfiltrate the entire DB schema definition via SQL injection. Category: Injection Tools: Burp Suite, sqlmap Review: This challenge is relatively easy due…
rawSEC 2022
On the 19th of October, I attended the rawSEC 2022 conference at Putra World Trade Centre (PWTC). The last time this cybersecurity community-based conference was held was in early 2020…
Smart Nation Expo 2022
Last week I went to Smart Nation Expo 2022 which was held in MITEC, Kuala Lumpur. It was a refreshing experience since it has been a long time since the…
4 Things in Mind When Reviewing Evaluator’s Workbook
General Tips for Lead Evaluator “What should I look for?” That is the question that the Lead Evaluator (LE) always has in mind when reviewing a workbook. Reviewing a workbook…
Overview of 5G Security Challenges and Solutions
Farhan Arif Mohamadfarhan.arif@cybersecurity.my Mohammad Asyran Fitri Dunya asyranfitri@cybersecurity.my Ahmad Dahari Jarno dahari@cybersecurity.my 5G is known as 5th generation of mobile network introduced to the international industries of telecommunication sectors as well as…