A critical vulnerability has been discovered in the Kuaishou streaming infrastructure that allows unauthenticated live streaming via RTMP to arbitrary stream keys. Once pushed, these streams are publi...
In the CTF@CIT 2025 cybersecurity competition, I participated in the Steganography category and came across an interesting challenge named "Blank Image". Despite appearing as a blank image, a clue in ...
In this challenge, we are presented with a seemingly innocent login form and a mysterious prompt: "Say my username." While it appears simple on the surface, this challenge requires a solid understandi...
The "Forgot Password" challenge from SKRCTF highlights a classic web security flaw commonly seen in beginner-level Capture The Flag (CTF) competitions. The challenge presents a simple login page where...
The "My First SQL" challenge from the SKRCTF series offers an accessible introduction to SQL injection (SQLi) vulnerabilities, making it an excellent starting point for individuals new to web security...
The "Where is the flag?" challenge from the SKRCTF series is a beginner-friendly web challenge that emphasises the importance of thorough inspection and attention to detail in web security.Challenge O...
Reverse engineering is a core skill in cybersecurity that involves analyzing a system, software, or binary to understand its design, functionality, or hidden components, often without access to its so...
As Khoo Lay Yang, the President of Sustainable Future Fusion (SFF) at Asia Pacific University of Technology and Innovation (APU/APIIT), I am honored to share one of the most fulfilling experiences in ...
It is a truly rewarding experience to witness yet another successful coordination of a Memorandum of Understanding (MOU) between the Asia Pacific University of Technology and Innovation (APU/APIIT) an...
In this lab, we will configure Router-on-a-Stick for Inter-VLAN Routing using Packet Tracer. Router-on-a-Stick is a networking technique used to allow communication between devices in different VLANs....
In modern networking, Virtual Local Area Networks (VLANs) and trunking play a crucial role in segmenting networks and ensuring efficient communication between different departments or devices. VLANs a...
In this activity, you will learn how to configure and verify trunk ports on Cisco switches using Packet Tracer. Trunking allows multiple VLANs to communicate across switches by forwarding tagged traff...
Virtual Local Area Networks (VLANs) are essential in networking for segmenting traffic, improving security, and reducing broadcast domains. In this Packet Tracer activity (3.3.12), we will configure V...
This write-up provides step-by-step instructions on how to configure SSH access on a Cisco switch using Packet Tracer. The objective is to secure remote management by enabling SSH, setting up user aut...
In this class task, you will explore the fascinating field of Audio Steganography, where information is hidden within audio signals. Through a series of tasks in Part A and Part B, you will utilize sp...
On behalf of Sustainable Future Fusion (SFF) at Asia Pacific University of Technology and Innovation (APU/APIIT), I am honored to share the success of our recent Food Supply Rescue initiative in colla...
As the President of Sustainable Future Fusion (SFF), it is with profound honor and sincere gratitude that I reflect upon our recent successful event at the esteemed Pusat Kreatif Kanak-Kanak Tuanku Ba...
As the President of Sustainable Future Fusion @ Asia Pacific University of Technology and Innovation (SFF@APU), I am proud to share our latest initiative—a meaningful Community Clean-Up Drive at Buk...
At Asia Pacific University of Technology & Innovation, we recently celebrated World Cultural Diversity Day in a way that truly embodied our commitment to unity, creativity, and innovation. As Pres...