Posts by Tag

wireless

Wireshark

2 minute read

This meeting, Matthew gave a quick rundown of Wireshark and it’s potential for packet analysis and network sniffing. Wireshark is “the world’s foremost netwo...

Eviltwin

2 minute read

This week, Matthew talked about Rogue Access Point attacks, specifically Evil Twin and Karma Attacks on Wireless Access Points and showed a /quick/ demo of a...

Networks

2 minute read

In the third week of the semester we began with a basic rundown of networks and host discovery using nmap. Then, we talked about memory forensics using “Vola...

Wireless

5 minute read

The second meeting started off with a simple discussion on Wireless Security Protocols, from OSA to WPA2. Then we went over the various ways to crack into th...

Back to Top ↑

pentesting

Enumeration

less than 1 minute read

This week we went over networking basics and how to do enumeration and packet sniffing

Evapi

less than 1 minute read

This week Matthew went over our plan for the semester and the EVAPI exploitation process EVAPI stands for Enumeration, Vuln Scanning, Access, Privilege Escal...

Exploitation1

9 minute read

To get on mailing list: goo.gl/HjJW7u To log into WiFi: auctf / !!auctf2016

Back to Top ↑

kickoff

Spring 2020 Kickoff

2 minute read

In the first EHC meeting of the semester we went over what events we will be participating in and what topics we will be covering this semester.

Kickoff 2 Electric Boogaloo

1 minute read

This week we went over the basics of our vision of the club this semester, as well as some ethics and other clerical stuff.

Kickoff Meeting And Kali

1 minute read

In the first AUCTF meeting we went over the basics of what CTFs are, and then talked about the major suite of tools we use for competitions: Kali Linux.

Back to Top ↑

events

Cyber Fire Puzzles Fall 2020 Report

1 minute read

Report Cyber Fire Puzzles (Fall 2020) is over! We want to thank everyone who participated in the event, and we hope that you enjoyed and learned from the exp...

Cyber Fire Puzzles Fall 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Cyber Fire Puzzles Spring 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Back to Top ↑

overthewire

Leviathan Walkthrough

4 minute read

This is a write-up for OverTheWire Leviathan. I am writing this under the assumption that you have completed the bandit series. This guide shoudl be pretty ...

Bandit Walkthrough

27 minute read

This is my personal writeup for OverTheWire’s Bandit game. This guide is going to be targeted for beginners in this type of game or Capture The Flag(CTF). Th...

Back to Top ↑

meetings

Cybersecurity Bootcamp 2020

3 minute read

For our second meeting, we presented a cybersecurity bootcamp. This primarily served as an introduction for people who were new to cyber, as this meeting cov...

Fall 2020 Kickoff

1 minute read

The first AUEHC meeting of the Fall 2020 semester was overall a success! It was an adjustment for everyone, as we had never done club meetings online, so the...

Back to Top ↑

forensics

Volatility

2 minute read

The second half of the third meeting of the semester focused on memory forensics. We discussed what memory forensics is and looked at Volatility, the front-r...

Back to Top ↑

crypto

Intro To Crypto

4 minute read

This week, Jacob went over the bare basics of cryptography, some of the most common ciphering techniques (substitution ciphers), and went over most of Over T...

Back to Top ↑

web

Dvwa

2 minute read

Matthews Notes

Back to Top ↑

hack_this_site

Hack This Site: Basic

5 minute read

Basic Level 1 This level is pretty easy. We are told that this level is a “idiot test.” Lets show them that we are everything but! It is a common trend in ...

Back to Top ↑