I recently held a Software Defined Radio (SDR) focused meeting for CCSO , playing around with an RTL-SDR. We had some fun decoding local hospital pager data, listening to radio stations, investigat...
I recently participated in SwampCTF , a 2-day student-run CTF put on by the University of Florida’s Student Information Security Team . Our team was madeup of a handful of students from CCSO , and ...
I recently participated in Deloitte’s Cyber Threat Competition for the first time, placing second. The competition consisted of two rounds: round 1 had a security questionnaire and CTF, and round ...
After repeatedly spinning up short-term Sliver C2 servers for various red team lab/club engagements, I decided to set up my own for future use. I chose to leverage Oracle Cloud’s Free Tier , i...
This is a write-up of the Sync machine on VulnLab by xct. This box involves anonymous rsync, cracking salted md5 hashes, and manipulating a backup script.
UserHint:
12Explore how to crack salted ...
This is a write-up of the Baby machine on VulnLab by xct. This box deals with anonymous LDAP enumeration, and exploitation of the SeBackupPrivilege to exfiltrate and crack user hashes.
UserHint: ...
While serving as the secretary for CCSO, one of my weekly tasks was to aggregate everything the club was doing and distribute that amongst our various platforms. This quickly became very tedious, a...
This post will serve as a brief overview of why I chose to create a portfolio site, and how to create your own with zero hardware and a relatively low barrier to entry. I created my site using Hugo...
A simple bash script to process canvas submission files of IntelliJ projects and submit them to Stanford’s MOSS for plagiarism detection. moss.sh simply serves as a wrapper that prepares canvas do...
Various Java Projects for IST261 , Application Development Design Studio. This course builds on the OO concepts from IST242, moving towards building more complex GUI-based projects following the MV...