TJCSC
PresentationsCTFWriteups

Presentations

We give weekly presentations on a variety of interesting topics.

Presentations (2021 - 2022)
2020 - 20212019 - 20202018 - 20192017 - 20182016 - 20172015 - 20162014 - 2015

Format String Vulnerability

5/27/2022
Format String attacks in binary exploitation
Hard

Return to libc

5/20/2022
Libc functions and returning to libc
Hard

ROP Gadgets

5/13/2022
Using Return-Oriented Programming (ROP) for binary exploitation
Hard

Quantum Cryptography

5/13/2022
Quantum computing and cryptography
Hard
Guest

Buffer Overflow

5/4/2022
An introduction to buffer overflows
Hard

Ghidra

4/29/2022
Using Ghidra for decompiling and static analysis
Medium

Python and JavaScript jailbreaks

4/29/2022
Exectuting code in python and javascript that shouldn't be executed
Medium
Guest

GDB

4/22/2022
Introduction to GDB, a debugger usually used to debug programs
Medium

WiFi Encryption

4/22/2022
Highlighting different WiFi authentication schemes
Medium
Guest

Assembly 2

4/15/2022
Assembly Stack & Syscalls
Hard

Assembly 1

3/11/2022
Basic ASM, how it works, and how to read it
Medium

Block Ciphers

2/25/2022
How block ciphers work and how to exploit them
Hard

RSA 2

2/18/2022
An outline of various attacks on RSA
Medium

XS-Search

2/11/2022
Using XS-Search to leak queries.
Hard
Advanced

RSA 1

2/11/2022
An introduction to the RSA cryptosystem
Medium

HTTP Desync

2/4/2022
Using HTTP Desync to smuggle HTTP requests
Hard
Advanced

Crypto Intro

2/4/2022
An introduction to basic cryptography and modular arithmetic
Easy

John the Ripper

1/14/2022
Using John the Ripper to crack password protected files, keys, and authentication tags
Medium

Wireshark

1/7/2022
Using wireshark to analyze network traffic
Medium

Android Reversing

12/10/2021
The Android APK format, and reversing bytecode
Hard
Advanced

Audio Forensics

12/10/2021
Decoding information from audio files
Medium

WebAssembly (WASM)

12/3/2021
Introduction to WASM, code that can be run in browsers
Hard
Advanced

Steganography

12/3/2021
How to hide & retrieve messages in various file types
Medium

Elliptic Curves

11/18/2021
Elliptic Curve Cryptography and Elliptic-Curve Diffie–Hellman
Hard
Advanced

File Forensics

11/18/2021
Extracting information from files
Medium

Diffie-Hellman

11/11/2021
Diffie-Hellman Key Exchange and solving the discrete log problem
Hard
Advanced

Cross Site Scripting (XSS)

11/11/2021
Exploiting websites with Cross Site Scripting (XXS) and getting around Content Security Policy (CSP)
Hard

Padding Oracle Attack

11/4/2021
Introduction to padding oracle attacks
Hard
Advanced

JSON Web Tokens

11/4/2021
JWTs and how to exploit them
Medium

LFI

10/29/2021
Introduction to Local File Inclusion exploitation
Hard
Advanced

PNG

10/22/2021
Overview of PNGs, chunks, and property bytes
Hard
Advanced

SQL Injection

10/22/2021
Overview of SQL Injection, including syntax, union-based SQLi, and timing attacks
Medium

XXE

10/15/2021
XML External Entities (XXE) and how to exploit them
Hard
Advanced

Web Intro

10/15/2021
Introduction to the basics of web exploitation
Easy

SSTI

10/8/2021
Introduction to Server-Side Template Injection (SSTI)
Hard
Advanced

Python Intro

10/8/2021
Introduction to Python syntax and data structures
Easy

SSRF

10/1/2021
Overview of SSRF, a security bug allowing attackers retrieve info from closed-off resources
Hard
Advanced

Linux Intro

10/1/2021
Introduction to Linux and using the Linux command line
Easy

Introduction

9/17/2021
Brief introduction of the club, including an overview of topics and Capture the Flag competitions
Easy
TJCSC FacebookTJCSC CTFTJCSC Discord