hackutk.com
HackUTK | Resources
https://hackutk.com/resources.html
Suggested Tools and Learning Resources for Computer Security. It’s important to establish a solid toolkit for any kind of security work. The list below is what we consider a good foundation for our members to start from, which you can build on as you get more experienced. Though we don't include links here, you can find most of these tools on Kali Linux. A VM every security practitioner should have) and on the Kali Linux tool site. Dig, whois, traceroute. Strings, xxd, file. Ubuntu 12.04 x32 and x64.
itszn.com
Blog
http://itszn.com/blog
Boombox - Windows 8.1 x64 Pwnable (CSAW 2015 Postmortem). Boombox is a windows 8.1 x64 pwning challange created by Markus Gaasedelen. For CSAW finals 2015. Sadly we ended up putting this challange off for too long during the ctf and ran out of time to solve it. However he offered it up as a challange to people on RPISEC. So I decided to try it out again. It is important to note that the global boombox state struct is located inside the stackframe of the main method. There is also an option to create ...
approach.rpi.edu
“Crushing it” w/ RPISEC
http://approach.rpi.edu/2015/03/11/crushing-it-w-rpi-sec
The Approach Discovery, Innovation, and Imagination at Rensselaer Polytechnic Institute. 8220;Crushing it” w/ RPISEC. March 11, 2015. A quick congratulations to RPISEC. Yes we can confirm, we crushed it pretty hard this year. Here’s the account of the event as taken from RPI Reddit. This year the team consisted of Branden Clark ’16, Patrick Biernat ’16, Austin Ralls ’17, Sophia D’Antoine ’15, and Markus Gaasedelen ’15. RPISEC placed 1st both at ISTS12 and ISTS11 (l...According to its website, RPI SEC is ...
SOCIAL ENGAGEMENT