Posts by Tag

meetings

Disk Forensics Spring 2021

4 minute read

For the first topic of the new year, we covered disk forensics. We discussed the layouts of common file systems and how to locate and recover files from them.

Kickoff Spring 2021

2 minute read

For our first meeting of 2021, we discussed some of the topics and events coming up in the spring semester.

Fall 2020 Closing

2 minute read

For the end of semester meeting for Fall 2020, we discussed the topics and events from the semester as well as the upcoming topics for Spring 2021.

Penetration Testing Fall 2020

3 minute read

Penetration testing, or pentesting, is the process of attacking a system in an attempt to find flaws or vulnerabilities in the system. Pentesters are almost ...

OSINT Fall 2020

2 minute read

From here on out, these “weekly” blog posts will serve a similar function to the previous post. They are for those who may have missed the general meeting bu...

Cybersecurity Bootcamp 2020

3 minute read

For our second meeting, we presented a cybersecurity bootcamp. This primarily served as an introduction for people who were new to cyber, as this meeting cov...

Fall 2020 Kickoff

1 minute read

The first AUEHC meeting of the Fall 2020 semester was overall a success! It was an adjustment for everyone, as we had never done club meetings online, so the...

Back to Top ↑

wireless

Wireshark

2 minute read

This meeting, Matthew gave a quick rundown of Wireshark and it’s potential for packet analysis and network sniffing. Wireshark is “the world’s foremost netwo...

Eviltwin

2 minute read

This week, Matthew talked about Rogue Access Point attacks, specifically Evil Twin and Karma Attacks on Wireless Access Points and showed a /quick/ demo of a...

Networks

2 minute read

In the third week of the semester we began with a basic rundown of networks and host discovery using nmap. Then, we talked about memory forensics using “Vola...

Wireless

5 minute read

The second meeting started off with a simple discussion on Wireless Security Protocols, from OSA to WPA2. Then we went over the various ways to crack into th...

Back to Top ↑

pentesting

Enumeration

less than 1 minute read

This week we went over networking basics and how to do enumeration and packet sniffing

Evapi

less than 1 minute read

This week Matthew went over our plan for the semester and the EVAPI exploitation process EVAPI stands for Enumeration, Vuln Scanning, Access, Privilege Escal...

Exploitation1

9 minute read

To get on mailing list: goo.gl/HjJW7u To log into WiFi: auctf / !!auctf2016

Back to Top ↑

events

Cyber Boot Camp 2021 Details

2 minute read

What is Cyber Boot Camp 2021? Cyber Boot Camp 2021 (CBC ‘21) is two separate events that are being hosted by Los Alamos National Laboratory and Sandia Nation...

Cyber Fire Puzzles Fall 2020 Report

1 minute read

Report Cyber Fire Puzzles (Fall 2020) is over! We want to thank everyone who participated in the event, and we hope that you enjoyed and learned from the exp...

Cyber Fire Puzzles Fall 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Cyber Fire Puzzles Spring 2020 Details

1 minute read

What are Cyber Fire Puzzles? Cyber Fire Puzzles are beginner-friendly cyber security challenges created by the U.S. Department of Energy and Los Alamos Natio...

Back to Top ↑

kickoff

Spring 2020 Kickoff

2 minute read

In the first EHC meeting of the semester we went over what events we will be participating in and what topics we will be covering this semester.

Kickoff 2 Electric Boogaloo

1 minute read

This week we went over the basics of our vision of the club this semester, as well as some ethics and other clerical stuff.

Kickoff Meeting And Kali

1 minute read

In the first AUCTF meeting we went over the basics of what CTFs are, and then talked about the major suite of tools we use for competitions: Kali Linux.

Back to Top ↑

overthewire

Leviathan Walkthrough

4 minute read

This is a write-up for OverTheWire Leviathan. I am writing this under the assumption that you have completed the bandit series. This guide shoudl be pretty ...

Bandit Walkthrough

27 minute read

This is my personal writeup for OverTheWire’s Bandit game. This guide is going to be targeted for beginners in this type of game or Capture The Flag(CTF). Th...

Back to Top ↑

forensics

Volatility

2 minute read

The second half of the third meeting of the semester focused on memory forensics. We discussed what memory forensics is and looked at Volatility, the front-r...

Back to Top ↑

crypto

Intro To Crypto

4 minute read

This week, Jacob went over the bare basics of cryptography, some of the most common ciphering techniques (substitution ciphers), and went over most of Over T...

Back to Top ↑

web

Dvwa

2 minute read

Matthews Notes

Back to Top ↑

hack_this_site

Hack This Site: Basic

5 minute read

Basic Level 1 This level is pretty easy. We are told that this level is a “idiot test.” Lets show them that we are everything but! It is a common trend in ...

Back to Top ↑