Enumeration
This week we went over networking basics and how to do enumeration and packet sniffing
This week we went over networking basics and how to do enumeration and packet sniffing
This week Matthew went over our plan for the semester and the EVAPI exploitation process EVAPI stands for Enumeration, Vuln Scanning, Access, Privilege Escal...
Matthews Notes
To get on mailing list: goo.gl/HjJW7u To log into WiFi: auctf / !!auctf2016
Slides
This week we went over the basics of our vision of the club this semester, as well as some ethics and other clerical stuff.
This week, Jacob went over the bare basics of cryptography, some of the most common ciphering techniques (substitution ciphers), and went over most of Over T...
This meeting, Matthew gave a quick rundown of Wireshark and it’s potential for packet analysis and network sniffing. Wireshark is “the world’s foremost netwo...
This week, Matthew talked about Rogue Access Point attacks, specifically Evil Twin and Karma Attacks on Wireless Access Points and showed a /quick/ demo of a...
The second half of the third meeting of the semester focused on memory forensics. We discussed what memory forensics is and looked at Volatility, the front-r...
In the third week of the semester we began with a basic rundown of networks and host discovery using nmap. Then, we talked about memory forensics using “Vola...
The second meeting started off with a simple discussion on Wireless Security Protocols, from OSA to WPA2. Then we went over the various ways to crack into th...
In the first AUCTF meeting we went over the basics of what CTFs are, and then talked about the major suite of tools we use for competitions: Kali Linux.
Basic Level 1 This level is pretty easy. We are told that this level is a “idiot test.” Lets show them that we are everything but! It is a common trend in ...
This is a write-up for OverTheWire Leviathan. I am writing this under the assumption that you have completed the bandit series. This guide shoudl be pretty ...
This is my personal writeup for OverTheWire’s Bandit game. This guide is going to be targeted for beginners in this type of game or Capture The Flag(CTF). Th...
A Collection of Physical Security resources.
Collection of reverse engineering resources from books to challenge sites to tools.
Collection of binary exploitation or pwn resources from books to challenge sites to tools.
Questions? Comments? Ping @vincent on the AUEHC Discord
Administrative Items