Presentations
We give weekly presentations on a variety of interesting topics.
Format String Vulnerability
5/27/2022
Format String attacks in binary exploitation
Hard
Return to libc
5/20/2022
Libc functions and returning to libc
Hard
ROP Gadgets
5/13/2022
Using Return-Oriented Programming (ROP) for binary exploitation
Hard
Quantum Cryptography
5/13/2022
Quantum computing and cryptography
Hard
Guest
Buffer Overflow
5/4/2022
An introduction to buffer overflows
Hard
Ghidra
4/29/2022
Using Ghidra for decompiling and static analysis
Medium
Python and JavaScript jailbreaks
4/29/2022
Exectuting code in python and javascript that shouldn't be executed
Medium
Guest
GDB
4/22/2022
Introduction to GDB, a debugger usually used to debug programs
Medium
WiFi Encryption
4/22/2022
Highlighting different WiFi authentication schemes
Medium
Guest
Assembly 2
4/15/2022
Assembly Stack & Syscalls
Hard
Assembly 1
3/11/2022
Basic ASM, how it works, and how to read it
Medium
Block Ciphers
2/25/2022
How block ciphers work and how to exploit them
Hard
RSA 2
2/18/2022
An outline of various attacks on RSA
Medium
XS-Search
2/11/2022
Using XS-Search to leak queries.
Hard
Advanced
RSA 1
2/11/2022
An introduction to the RSA cryptosystem
Medium
HTTP Desync
2/4/2022
Using HTTP Desync to smuggle HTTP requests
Hard
Advanced
Crypto Intro
2/4/2022
An introduction to basic cryptography and modular arithmetic
Easy
John the Ripper
1/14/2022
Using John the Ripper to crack password protected files, keys, and authentication tags
Medium
Wireshark
1/7/2022
Using wireshark to analyze network traffic
Medium
Android Reversing
12/10/2021
The Android APK format, and reversing bytecode
Hard
Advanced
Audio Forensics
12/10/2021
Decoding information from audio files
Medium
WebAssembly (WASM)
12/3/2021
Introduction to WASM, code that can be run in browsers
Hard
Advanced
Steganography
12/3/2021
How to hide & retrieve messages in various file types
Medium
Elliptic Curves
11/18/2021
Elliptic Curve Cryptography and Elliptic-Curve Diffie–Hellman
Hard
Advanced
File Forensics
11/18/2021
Extracting information from files
Medium
Diffie-Hellman
11/11/2021
Diffie-Hellman Key Exchange and solving the discrete log problem
Hard
Advanced
Cross Site Scripting (XSS)
11/11/2021
Exploiting websites with Cross Site Scripting (XXS) and getting around Content Security Policy (CSP)
Hard
Padding Oracle Attack
11/4/2021
Introduction to padding oracle attacks
Hard
Advanced
JSON Web Tokens
11/4/2021
JWTs and how to exploit them
Medium
LFI
10/29/2021
Introduction to Local File Inclusion exploitation
Hard
Advanced
PNG
10/22/2021
Overview of PNGs, chunks, and property bytes
Hard
Advanced
SQL Injection
10/22/2021
Overview of SQL Injection, including syntax, union-based SQLi, and timing attacks
Medium
XXE
10/15/2021
XML External Entities (XXE) and how to exploit them
Hard
Advanced
Web Intro
10/15/2021
Introduction to the basics of web exploitation
Easy
SSTI
10/8/2021
Introduction to Server-Side Template Injection (SSTI)
Hard
Advanced
Python Intro
10/8/2021
Introduction to Python syntax and data structures
Easy
SSRF
10/1/2021
Overview of SSRF, a security bug allowing attackers retrieve info from closed-off resources
Hard
Advanced
Linux Intro
10/1/2021
Introduction to Linux and using the Linux command line
Easy
Introduction
9/17/2021
Brief introduction of the club, including an overview of topics and Capture the Flag competitions
Easy