Posts by Year

2020

Cybersecurity Bootcamp 2020

3 minute read

For our second meeting, we presented a cybersecurity bootcamp. This primarily served as an introduction for people who were new to cyber, as this meeting cov...

Fall 2020 Kickoff

1 minute read

The first AUEHC meeting of the Fall 2020 semester was overall a success! It was an adjustment for everyone, as we had never done club meetings online, so the...

Cyber Fire Puzzles Fall 2020 Report

1 minute read

Report Cyber Fire Puzzles (Fall 2020) is over! We want to thank everyone who participated in the event, and we hope that you enjoyed and learned from the exp...

Cyber Fire Puzzles Fall 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Pentesting 101

1 minute read

What is Pentesting? According to Wikipedia, penetration testing (pentesting) is: an authorized simulated cyberattack on a computer system, performed to ev...

Cyber Fire Puzzles Spring 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Spring 2020 Kickoff

2 minute read

In the first EHC meeting of the semester we went over what events we will be participating in and what topics we will be covering this semester.

How to setup a Virtual Machine!

4 minute read

Edit: As of January 28, 2020 Kali’s installation is a bit different. The main core of everything is still the same. The main difference is now the default us...

Back to Top ↑

2019

Level 0!

1 minute read

Welcome to the Auburn Ethical Hacking Club (EHC) site!

Hack This Site: Basic

5 minute read

Basic Level 1 This level is pretty easy. We are told that this level is a “idiot test.” Lets show them that we are everything but! It is a common trend in ...

Back to Top ↑

2018

Leviathan Walkthrough

4 minute read

This is a write-up for OverTheWire Leviathan. I am writing this under the assumption that you have completed the bandit series. This guide shoudl be pretty ...

Bandit Walkthrough

27 minute read

This is my personal writeup for OverTheWire’s Bandit game. This guide is going to be targeted for beginners in this type of game or Capture The Flag(CTF). Th...

Back to Top ↑

2017

Enumeration

less than 1 minute read

This week we went over networking basics and how to do enumeration and packet sniffing

Evapi

less than 1 minute read

This week Matthew went over our plan for the semester and the EVAPI exploitation process EVAPI stands for Enumeration, Vuln Scanning, Access, Privilege Escal...

Back to Top ↑

2016

Dvwa

2 minute read

Matthews Notes

Exploitation1

9 minute read

To get on mailing list: goo.gl/HjJW7u To log into WiFi: auctf / !!auctf2016

Kickoff 2 Electric Boogaloo

1 minute read

This week we went over the basics of our vision of the club this semester, as well as some ethics and other clerical stuff.

Intro To Crypto

4 minute read

This week, Jacob went over the bare basics of cryptography, some of the most common ciphering techniques (substitution ciphers), and went over most of Over T...

Wireshark

2 minute read

This meeting, Matthew gave a quick rundown of Wireshark and it’s potential for packet analysis and network sniffing. Wireshark is “the world’s foremost netwo...

Eviltwin

2 minute read

This week, Matthew talked about Rogue Access Point attacks, specifically Evil Twin and Karma Attacks on Wireless Access Points and showed a /quick/ demo of a...

Volatility

2 minute read

The second half of the third meeting of the semester focused on memory forensics. We discussed what memory forensics is and looked at Volatility, the front-r...

Networks

2 minute read

In the third week of the semester we began with a basic rundown of networks and host discovery using nmap. Then, we talked about memory forensics using “Vola...

Wireless

5 minute read

The second meeting started off with a simple discussion on Wireless Security Protocols, from OSA to WPA2. Then we went over the various ways to crack into th...

Kickoff Meeting And Kali

1 minute read

In the first AUCTF meeting we went over the basics of what CTFs are, and then talked about the major suite of tools we use for competitions: Kali Linux.

Back to Top ↑