Home
Andy Smith
Cancel

Creating your own Certificate Authority and Using TLS Client Certificates (mTLS)

In this article, I’ll go over how to set up your own public key infrastructure (PKI) by creating a private certificate authority (including both a root and an intermediate CA), creating TLS client ...

Introduction to Web Exploitation

In this article, I’ll go over how to start doing web challenges in capture-the-flag (CTF) competitions from the ground up. This is adapted from a talk I gave at MasonCC, the cybersecurity club at G...

Forensic Analysis of Citymapper for Android

Abstract/BLUF The goal of this project is to analyze the Citymapper app on Android and search for forensic artifacts present in its configuration and storage files. Citymapper is a navigation app ...

Useful Security Tools

This is an incomplete list of some useful security tools. Forensics FTK Imager NTFS imager that lets you browse all data in an NTFS partition. Useful for discovering NTFS-specific data such as se...

PicoCTF 2017 Writeups

Forensics Digital Camoflage (50pts) Instructions We need to gain access to some routers. Let’s try and see if we can find the password in the captured network data: data.pcap. Hints It ...