For the last week, VetSec competed in the Hacktober.org CTF event, which consisted of challenges in forensics, steganography, programming, offensive tactics, web application, reverse engineering, cryptography, and more. I am happy to announce that WE WON! Our team consisted of the following members: Elliot Chernofsky (@emtuls) Reuben Booker (@reubadoob) Rob Fuller (@mubix) Myself (@hmaverickadams) The
Introduction: This week’s retiring box is DevOops. Coming in at a difficulty rating of 4.3/10, it’s not an incredibly hard machine to root, but it does teach some valuable lessons in web application penetration testing and basic Linux privesc enumeration. Let’s take a look at what a simple “oops” can mean for the bad guy.
Introduction This week’s retired box is Fighter, which brought a lot of pain into my life. Having just started my HTB journey over the past couple of weeks, I have challenged myself to complete the retiring box, at a minimum, so that I can continue to post write-ups. Fighter caused me hours of lost sleep.
Introduction: With Sunday’s retirement today, I finally get to write my first Hack The Box write-up. I cannot tell you how exciting that is, but Borat can: Sunday was a bit on the easier side, but in the end, taught me a new tricks I had never seen before. The box reminded me of my
If you’re a veteran reading this or maybe you’re not a veteran you’re just here trying to figure out how to get into infosec, DIVE IN.
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
An introduction and learning experience with Vagrant and creating a wargame.
How to: This portion of the article focuses on how to set up your Raspberry Pi and Android phone with the appropriate tools. Once you have set everything up, feel free to watch the video for a live demonstration. Equipment used: -Raspberry Pi 3 with Kali installed (Amazon link) -Android (Samsung Galaxy 8S) -ALFA AWUS036NH
Introduction: Hello! I’m writing this article to share my experiences in finding my first job in cyber security. More specifically, my first job in penetration testing. I wanted to share my experiences in hopes of motivating others who want to come into the cyber security field or already are applying to jobs in the field,
Video tutorials: Written tutorial: Hello everyone! Welcome to my first post here at VetSec. For my first blog, I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My