

<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://blog.ajsmith.org/</id>
  <title>Andy Smith</title>
  <subtitle>Cybersecurity and digital forensics posts from a GMU student.</subtitle>
  <updated>2025-06-10T19:14:13-04:00</updated>
  <author>
    <name>Andy Smith</name>
    <uri>https://blog.ajsmith.org/</uri>
  </author>
  <link rel="self" type="application/atom+xml" href="https://blog.ajsmith.org/feed.xml"/>
  <link rel="alternate" type="text/html" hreflang="en"
    href="https://blog.ajsmith.org/"/>
  <generator uri="https://jekyllrb.com/" version="4.2.2">Jekyll</generator>
  <rights> © 2025 Andy Smith </rights>
  <icon>/assets/img/favicons/favicon.ico</icon>
  <logo>/assets/img/favicons/favicon-96x96.png</logo>


  
  <entry>
    <title>Creating your own Certificate Authority and Using TLS Client Certificates (mTLS)</title>
    <link href="https://blog.ajsmith.org/posts/Creating-your-own-Certificate-Authority-and-Using-TLS-Client-Certificates-mTLS/" rel="alternate" type="text/html" title="Creating your own Certificate Authority and Using TLS Client Certificates (mTLS)" />
    <published>2022-09-30T00:00:00-04:00</published>
  
    <updated>2022-09-30T00:00:00-04:00</updated>
  
    <id>https://blog.ajsmith.org/posts/Creating-your-own-Certificate-Authority-and-Using-TLS-Client-Certificates-mTLS/</id>
    <content src="https://blog.ajsmith.org/posts/Creating-your-own-Certificate-Authority-and-Using-TLS-Client-Certificates-mTLS/" />
    <author>
      <name>Andy Smith</name>
    </author>

  
    
    <category term="Linux" />
    
  

  
    <summary>
      





      In this article, I’ll go over how to set up your own public key infrastructure (PKI) by creating a private certificate authority (including both a root and an intermediate CA), creating TLS client certificates for TLS mutual authentication (mTLS), and generating and using code signing certificates.

Prerequisites


  Python 3.8+
  A command line


Getting Started

Whether you’re running interna...
    </summary>
  

  </entry>

  
  <entry>
    <title>Introduction to Web Exploitation</title>
    <link href="https://blog.ajsmith.org/posts/Introduction-to-Web-Exploitation/" rel="alternate" type="text/html" title="Introduction to Web Exploitation" />
    <published>2022-05-11T00:00:00-04:00</published>
  
    <updated>2022-05-11T00:00:00-04:00</updated>
  
    <id>https://blog.ajsmith.org/posts/Introduction-to-Web-Exploitation/</id>
    <content src="https://blog.ajsmith.org/posts/Introduction-to-Web-Exploitation/" />
    <author>
      <name>Andy Smith</name>
    </author>

  
    
    <category term="CTF" />
    
  

  
    <summary>
      





      In this article, I’ll go over how to start doing web challenges in capture-the-flag (CTF) competitions from the ground up. This is adapted from a talk I gave at MasonCC, the cybersecurity club at George Mason University.

What is “Web”?

When someone says web, they really just mean communication between a web server and a web client (such as a web browser). There are many different web servers ...
    </summary>
  

  </entry>

  
  <entry>
    <title>Forensic Analysis of Citymapper for Android</title>
    <link href="https://blog.ajsmith.org/posts/Forensic-Analysis-of-Citymapper-for-Android/" rel="alternate" type="text/html" title="Forensic Analysis of Citymapper for Android" />
    <published>2021-11-28T15:20:00-05:00</published>
  
    <updated>2021-11-28T15:20:00-05:00</updated>
  
    <id>https://blog.ajsmith.org/posts/Forensic-Analysis-of-Citymapper-for-Android/</id>
    <content src="https://blog.ajsmith.org/posts/Forensic-Analysis-of-Citymapper-for-Android/" />
    <author>
      <name>Andy Smith</name>
    </author>

  
    
    <category term="Forensics" />
    
  

  
    <summary>
      





      Abstract/BLUF

The goal of this project is to analyze the Citymapper app on Android and search for forensic artifacts present in its configuration and storage files. Citymapper is a navigation app focused on pedestrian and public transit navigation in intracity areas. Citymapper only requires a logical extraction to obtain its configuration files and main database. This means that the device do...
    </summary>
  

  </entry>

  
  <entry>
    <title>Useful Security Tools</title>
    <link href="https://blog.ajsmith.org/posts/Useful-Security-Tools/" rel="alternate" type="text/html" title="Useful Security Tools" />
    <published>2018-07-04T19:24:00-04:00</published>
  
    <updated>2018-07-04T19:24:00-04:00</updated>
  
    <id>https://blog.ajsmith.org/posts/Useful-Security-Tools/</id>
    <content src="https://blog.ajsmith.org/posts/Useful-Security-Tools/" />
    <author>
      <name>Andy Smith</name>
    </author>

  
    
  

  
    <summary>
      





      This is an incomplete list of some useful security tools.

Forensics

FTK Imager
NTFS imager that lets you browse all data in an NTFS partition. Useful for discovering NTFS-specific data such as security IDs of computers a partition has been connected to.

Volatility
Memory forensics tool

Binwalk
Looks for headers inside of files to find data structures or files inside of files.

Foremost
Sear...
    </summary>
  

  </entry>

  
  <entry>
    <title>PicoCTF 2017 Writeups</title>
    <link href="https://blog.ajsmith.org/posts/PicoCTF-2017-Writeups/" rel="alternate" type="text/html" title="PicoCTF 2017 Writeups" />
    <published>2018-01-27T01:51:53-05:00</published>
  
    <updated>2018-01-27T01:51:53-05:00</updated>
  
    <id>https://blog.ajsmith.org/posts/PicoCTF-2017-Writeups/</id>
    <content src="https://blog.ajsmith.org/posts/PicoCTF-2017-Writeups/" />
    <author>
      <name>Andy Smith</name>
    </author>

  
    
  

  
    <summary>
      





      Forensics

Digital Camoflage (50pts)

Instructions


  We need to gain access to some routers. Let’s try and see if we can find the password in the captured network data: data.pcap.


Hints


  It looks like someone logged in with their password earlier. Where would log in data be located in a network capture?
If you think you found the flag, but it doesn’t work, consider that the data may be e...
    </summary>
  

  </entry>

</feed>


