VetSec’s Board believes an official statement is required in light of the current events in the United States. All of our US and Allied service members dedicated some portion of their life in service to their country. This occurred at the expense of commitments to their families, quality of life, personal safety, and numerous other
Part 3 of creating my Wargame to teach people exploit development and reverse engineering.
For the last week, VetSec competed in the Hacktober.org CTF event, which consisted of challenges in forensics, steganography, programming, offensive tactics, web application, reverse engineering, cryptography, and more. I am happy to announce that WE WON! Our team consisted of the following members: Elliot Chernofsky (@emtuls) Reuben Booker (@reubadoob) Rob Fuller (@mubix) Myself (@hmaverickadams) The
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
Introduction: Hello! I’m writing this article to share my experiences in finding my first job in cyber security. More specifically, my first job in penetration testing. I wanted to share my experiences in hopes of motivating others who want to come into the cyber security field or already are applying to jobs in the field,
Video tutorials: Written tutorial: Hello everyone! Welcome to my first post here at VetSec. For my first blog, I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My