104 |
Rockwell Automation Visit |
Oct 30, 2019
|
|
103 |
Reverse Engineering Basics |
Oct 23, 2019
|
|
102 |
Vulnerabilities and Exploits |
Oct 2, 2019
|
|
101 |
Battelle AFL-Unicorn Demo |
Sep 25, 2019
|
|
100 |
Vulnerability Scanning |
Sep 18, 2019
|
|
99 |
Linux Basics |
Sep 11, 2019
|
|
98 |
Virtual Machines |
Sep 4, 2019
|
|
97 |
Fall 2019 Briefing |
Aug 28, 2019
|
|
96 |
Pwn Adventure 3 Cont. + Speedhack |
May 15, 2019
|
|
95 |
Pwn Adventure 3 Cont. |
Apr 24, 2019
|
|
94 |
Senior Design Projects and Crack-mes |
Apr 17, 2019
|
|
93 |
Pwn Adventure |
Apr 24, 2019
|
|
92 |
Senior Designs and MBE crackmes |
Apr 17, 2019
|
|
91 |
Battelle Presentation on Reverse Engineering |
Apr 10, 2019
|
|
90 |
MBE Basic Binary Exploitation |
Apr 3, 2019
|
|
89 |
Lab Updates |
Mar 27, 2019
|
|
88 |
GHIDRA |
Mar 13, 2019
|
|
87 |
REVOLUTION@UC CTF Review |
Mar 6, 2019
|
|
86 |
Cyber@UC CTF-TOOL Demo |
Feb 27, 2019
|
|
85 |
Goat Dissasembly |
Feb 13, 2019
|
|
84 |
SQL Injection |
Feb 6, 2019
|
|
83 |
Career Fair Prep |
Jan 30, 2019
|
|
82 |
ICMP and ARP exploits |
Jan 23, 2019
|
|
81 |
Intel Management Engine and Other Coprocessors |
Jan 16, 2019
|
|
80 |
Worldwide Cyber |
Dec 4, 2018
|
|
79 |
Metasploit and exploits |
Nov 27, 2018
|
|
78 |
Aaron McCanty visiting from Battelle |
Nov 20, 2018
|
|
77 |
Goat Dissasembly |
Nov 13, 2018
|
|
76 |
MITRE Framework (continued) |
Nov 6, 2018
|
|
75 |
MITRE Framework (continued) |
Oct 30, 2018
|
|
74 |
MITRE Framework |
Oct 23, 2018
|
|
73 |
Introduction to Linux Distributions |
Oct 16, 2018
|
|
72 |
Firewalls and IPTables |
Oct 9, 2018
|
|
71 |
Networking Part 2: Networking Analysis |
Oct 2, 2018
|
|
70 |
Networking and Basic Security |
Sep 25, 2018
|
|
69 |
NSA Visit with Enigma Machine |
Sep 18, 2018
|
|
68 |
Advanced Persistent Threats |
Sep 11, 2018
|
|
67 |
Bash and OverTheWire |
Sep 4, 2018
|
|
66 |
Welcome New Members! |
Aug 28, 2018
|
|
65 |
Planning for Fall Semester |
Aug 22, 2018
|
|
64 |
Wireless Auditing and Monitoring Tools |
Aug 15, 2018
|
|
63 |
Contributing to the website |
Aug 8, 2018
|
|
62 |
Finals Week |
Aug 1, 2018
|
|
61 |
Running a Linux box securely |
Jul 25, 2018
|
|
60 |
Aircrack with Chris |
Jul 18, 2018
|
|
59 |
Cool GitHub Projects! (actually) |
Jul 11, 2018
|
|
58 |
Cool GitHub Projects! |
Jun 27, 2018
|
|
57 |
SDR Fun! |
Jun 20, 2018
|
|
56 |
W I F I |
Jun 13, 2018
|
|
55 |
Wireshark Demo |
Jun 6, 2018
|
|
54 |
Router Login Bypass |
May 30, 2018
|
|
53 |
Cross-Site Request Forgery (CSRF) |
May 23, 2018
|
|
52 |
BSides Recap and Memory Scanning |
May 16, 2018
|
|
51 |
Reverse Engineering: Android apps and more |
May 9, 2018
|
|
50 |
Systems Exploitation: Metasploit |
Apr 18, 2018
|
|
49 |
Systems Exploitation: Sniffing, Man in the Middle, etc. |
Apr 11, 2018
|
|
48 |
Docker and OpenVAS |
Apr 4, 2018
|
|
47 |
POCs, CVEs, and Scanning |
Mar 28, 2018
|
|
46 |
Direct Recon, pt. 2 |
Mar 21, 2018
|
|
45 |
Direct Recon, pt. 1 |
Mar 7, 2018
|
|
44 |
Indirect Recon |
Feb 28, 2018
|
|
43 |
Cross-Site Scripting (XSS) |
Feb 21, 2018
|
|
42 |
CEH Cryptography |
Feb 14, 2018
|
|
41 |
CEH Networking, pt. 2 |
Feb 7, 2018
|
|
40 |
CEH Networking, pt. 1 |
Jan 31, 2018
|
|
39 |
Guest Speaker Dr. Williams |
Jan 24, 2018
|
|
38 |
Becoming a Certified Ethical Hacker |
Jan 17, 2018
|
|
37 |
Virtual Machine Setup |
Jan 10, 2018
|
|
36 |
Red Team Recap |
Dec 6, 2017
|
|
35 |
Learning Exploits |
Nov 29, 2017
|
|
34 |
Learning DataPackets |
Nov 15, 2017
|
|
33 |
Learning Kali Linux Tools |
Nov 8, 2017
|
|
32 |
Setting up a Virtual Machine |
Nov 1, 2017
|
|
31 |
Hardware Hacking |
Oct 25, 2017
|
|
30 |
Metasploit and Armitage Basics |
Oct 18, 2017
|
|
29 |
Mimikatz Password Stealing |
Oct 11, 2017
|
|
28 |
Cyber Kill Chain |
Oct 4, 2017
|
|
27 |
Assembly and APTs |
Sep 27, 2017
|
|
26 |
Ida Pro and more! |
Sep 20, 2017
|
|
25 |
Vulnerabilities and more! |
Sep 13, 2017
|
|
24 |
Meet New Leadership and Wireshark |
Sep 6, 2017
|
|
23 |
Networking, Bash, and CTFs |
Aug 30, 2017
|
|
22 |
Cuckoo Sandbox Demo |
Jan 1, 1900
|
|
20 |
Malware Sandboxing with Cuckoo |
Jan 1, 1900
|
|
18 |
Meeting 18 |
Jan 1, 1900
|
|
17 |
Dumping Windows Credentials, Threat Intel, and more |
Jan 1, 1900
|
|
14 |
B-Sides and Wargames |
Jan 1, 1900
|
|
12 |
Wargames! |
Jan 1, 1900
|
|
6 |
Wireshark and Future Plans |
Jan 1, 1900
|
|
5 |
Wireshark and more |
Jan 1, 1900
|
|
4 |
Meeting 4 |
Jan 1, 1900
|
|
3 |
Wireshark, Web Development, Encryption |
Jan 1, 1900
|
|
2 |
Committees, Leadership, and Goals |
Jan 1, 1900
|
|
1 |
UC.yber Introduction |
Feb 26, 2017
|
|