• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Chitchat Sinkie Shivadagger Emerges Top Hacker In Mindef Global Competition! Grand Prize of US$5k!!

JohnTan

Alfrescian (InfP)
Generous Asset
Joined
Oct 30, 2014
Messages
36,768
Points
113
mindef-bounty-programme.jpg


SINGAPORE: He used to hack online video games to win prizes when he was in secondary school.

Now, this 30-year-old cybersecurity manager from Ernst & Young has been rewarded for being the top overall white hat participant in MINDEF's bug bounty programme.

The hacker, who wanted to be known only by his codename Darrel Shivadagger, reported nine out of 35 vulnerabilities that existed in MINDEF systems, one of which was rated a "high severity" bug. He was awarded US$5,000 (S$6,606) for his efforts.

"They (MINDEF) have systems in place that are actually quite sensitive,” Darrel said. “They actually warded off very intrusive attempts from me. I was able to find only client-side vulnerabilities. I couldn't really find anything major or server-side related.”

Darrel was one of 264 white hat hackers from around the world who participated in the programme, including people from the United States, Singapore, India, Romania, Canada, Russia, Sweden, Ireland, Egypt and Pakistan.

They were invited to try to penetrate systems - including the MINDEF’s public website, NS Portal and Defence Mail - for three weeks from Jan 15 until Feb 4.

Of those who participated, 17 spotted vulnerabilities that were valid. Of the 35 vulnerability reports, 23 were classified as "low severity", 10 "medium" and two "high". None were rated as "critical".

According to MINDEF, they responded to the hackers’ vulnerability reports within five hours on average. In total, MINDEF rewarded US$14,750 in bounties to the 17 successful hackers who participated.

MINDEF’s Defence Cyber Chief David Koh said that the exercise was a "useful and effective programme".

"We have started sharing our processes with other government agencies so that they understand exactly what has happened, understand the amount of resources that has been put into this."

MINDEF added that it will continue to explore other methods to evolve and improve its defences against cyber threats.

Read more at https://www.channelnewsasia.com/new...00-after-finding-9-vulnerabilities-in-9978058
 
Smart sinkie, blend in with the crowd. I tot for sure must be ah neh.
 
Will local Indians accuse him of cultural appropriating an Indian deity?
 
Only US$5,000....attracts only the small flies & the smaller fly....like this 'shit digger'....you put in a bounty of US$500,000....you get the 'lord of the flies'....hackers!
 
shud be $50,000........as the damage wud cause $500,000 at least

That is what I said only US$5,000....only attracts tiny flies in the hacker's world....you think, any of these REAL HACKERS out there, will want to soil their name for US$5,000??
 
That is what I said only US$5,000....only attracts tiny flies in the hacker's world....you think, any of these REAL HACKERS out there, will want to soil their name for US$5,000??

Wow. Totally agreed. This is as good as telling the garment to ‘watch out’ for you as you are a ‘solid’ hacker..
 
"We have started sharing our processes with other government agencies so that they understand exactly what has happened, understand the amount of resources that has been put into this."
Please share with SBF to prevent it from getting hacked like HWZ.
 
Back
Top