In this article, I’ll go over how to set up your own public key infrastructure (PKI) by creating a private certificate authority (including both a root and an intermediate CA), creating TLS client ...
Introduction to Web Exploitation
In this article, I’ll go over how to start doing web challenges in capture-the-flag (CTF) competitions from the ground up. This is adapted from a talk I gave at MasonCC, the cybersecurity club at G...
Forensic Analysis of Citymapper for Android
Abstract/BLUF The goal of this project is to analyze the Citymapper app on Android and search for forensic artifacts present in its configuration and storage files. Citymapper is a navigation app ...
Useful Security Tools
This is an incomplete list of some useful security tools. Forensics FTK Imager NTFS imager that lets you browse all data in an NTFS partition. Useful for discovering NTFS-specific data such as se...
PicoCTF 2017 Writeups
Forensics Digital Camoflage (50pts) Instructions We need to gain access to some routers. Let’s try and see if we can find the password in the captured network data: data.pcap. Hints It ...
- 1
- 1 / 1