Kickoff Spring 2021
For our first meeting of 2021, we discussed some of the topics and events coming up in the spring semester.
For our first meeting of 2021, we discussed some of the topics and events coming up in the spring semester.
What is Cyber Boot Camp 2021? Cyber Boot Camp 2021 (CBC ‘21) is two separate events that are being hosted by Los Alamos National Laboratory and Sandia Nation...
For the end of semester meeting for Fall 2020, we discussed the topics and events from the semester as well as the upcoming topics for Spring 2021.
Penetration testing, or pentesting, is the process of attacking a system in an attempt to find flaws or vulnerabilities in the system. Pentesters are almost ...
In our meeting on October 13, we discussed threat intelligence and network security.
For the first week of October, we discussed cryptography and encoding.
For the final two weeks in September, we discussed web application hacking.
From here on out, these “weekly” blog posts will serve a similar function to the previous post. They are for those who may have missed the general meeting bu...
For our second meeting, we presented a cybersecurity bootcamp. This primarily served as an introduction for people who were new to cyber, as this meeting cov...
The first AUEHC meeting of the Fall 2020 semester was overall a success! It was an adjustment for everyone, as we had never done club meetings online, so the...
Report Cyber Fire Puzzles (Fall 2020) is over! We want to thank everyone who participated in the event, and we hope that you enjoyed and learned from the exp...
What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...
A Collection of Physical Security resources.
Questions? Comments? Ping @vincent on the AUEHC Discord
What is Pentesting? According to Wikipedia, penetration testing (pentesting) is: an authorized simulated cyberattack on a computer system, performed to ev...
What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...
Collection of reverse engineering resources from books to challenge sites to tools.
Collection of binary exploitation or pwn resources from books to challenge sites to tools.
Administrative Items
In the first EHC meeting of the semester we went over what events we will be participating in and what topics we will be covering this semester.
Edit: As of January 28, 2020 Kali’s installation is a bit different. The main core of everything is still the same. The main difference is now the default us...
Welcome to the Auburn Ethical Hacking Club (EHC) site!
Basic Level 1 This level is pretty easy. We are told that this level is a “idiot test.” Lets show them that we are everything but! It is a common trend in ...
This is a write-up for OverTheWire Leviathan. I am writing this under the assumption that you have completed the bandit series. This guide shoudl be pretty ...
This is my personal writeup for OverTheWire’s Bandit game. This guide is going to be targeted for beginners in this type of game or Capture The Flag(CTF). Th...
This week we went over networking basics and how to do enumeration and packet sniffing
This week Matthew went over our plan for the semester and the EVAPI exploitation process EVAPI stands for Enumeration, Vuln Scanning, Access, Privilege Escal...
Matthews Notes
To get on mailing list: goo.gl/HjJW7u To log into WiFi: auctf / !!auctf2016
Slides
This week we went over the basics of our vision of the club this semester, as well as some ethics and other clerical stuff.
This week, Jacob went over the bare basics of cryptography, some of the most common ciphering techniques (substitution ciphers), and went over most of Over T...
This meeting, Matthew gave a quick rundown of Wireshark and it’s potential for packet analysis and network sniffing. Wireshark is “the world’s foremost netwo...
This week, Matthew talked about Rogue Access Point attacks, specifically Evil Twin and Karma Attacks on Wireless Access Points and showed a /quick/ demo of a...
The second half of the third meeting of the semester focused on memory forensics. We discussed what memory forensics is and looked at Volatility, the front-r...
In the third week of the semester we began with a basic rundown of networks and host discovery using nmap. Then, we talked about memory forensics using “Vola...
The second meeting started off with a simple discussion on Wireless Security Protocols, from OSA to WPA2. Then we went over the various ways to crack into th...
In the first AUCTF meeting we went over the basics of what CTFs are, and then talked about the major suite of tools we use for competitions: Kali Linux.