PeakChaos Meeting Tonight 2/19

We will be having a meeting for PeakChaos tonight 2/19 in Osborne A208 at 7:30PM.

We will be going over Use After Free vulnerabilities as well as go through a walkthrough of a vulnerability from DEFCON 2014 Qualifiers.

Here is the link to the presentation
https://docs.google.com/presentation/d/11LpCE3NV1kPnuk5gSzjlrLyJkyKFkfEAYc5f7TDENqo/edit?usp=sharing

And here is the link to the folder
https://drive.google.com/open?id=0B9pM7c8mX0FveG9CakZtZndzZXc&authuser=0

See you guys tonight!

PeakChaos Meeting Tonight 2/12

Tonight we will be having a meeting at the same bat time and the same bat place.

We will be going over basic binary exploitation, and then as always we will be doing some guided challenges with tutorials.

The presentation is located at
https://drive.google.com/open?id=1TBnvr948KuE2qFACpOdMKCxckzku-8nrb8mtqnI94W4&authuser=0

And the folder is located at
https://drive.google.com/open?id=0B9pM7c8mX0FvVVJmOUNvZXIxSjg&authuser=0

Hope to see you all there!  Also, if you can’t make it, then tonight’s meeting will hopefully be posted to YouTube sometime before next week’s meeting!

 

Sam

PeakChaos Meeting Tonight 2/5

There will be a meeting tonight in Osborne A208 at 7:30PM on Encryption and Side Channel Attacks.  We will be having a lecture followed by a couple challenges.  Additionally, tonight is the first meeting of our research group.

For the lecture, you can access the slides here:
https://docs.google.com/presentation/d/1BudmTnNCz9sBkEu3lh6GcRybyU3lU3jJVERQ4fKwwpg/edit?usp=sharing

For the additional files, you can go here
https://drive.google.com/open?id=0B9pM7c8mX0Fva3VnVmdUYkN1ems&authuser=0

For the research group, you can get your files here
https://drive.google.com/open?id=0B9pM7c8mX0FvflZtNVM4NU5FNVV3QTdDRWpwbURYZklwQkw1SEw3QmNmcWltZXlxdzhxR0k&authuser=0

Hope to see you guys tonight!

 

PeakChaos Meeting Tonight 1/29

There will be a PeakChaos meeting tonight in Osborne A208 at 7:30PM!

 We will be going over web injections: SQL injections, command injections, and directory traversal.
We’re going to have some fun challenges and hopefully a short lecture.
You can access the presentation here
https://docs.google.com/presentation/d/18NrkteMZjwzYgs-jlSKrbbdatHLKnGQxmcMS7aG10m8/edit?usp=sharing
And the related files will be accessible in this folder (when they become available)
https://drive.google.com/open?id=0B9pM7c8mX0FvOXRNUGE5UGVQV0U&authuser=0
 Have a great meeting!
 
Sam

PeakChaos Meeting Tonight 1/22

There will be a PeakChaos meeting tonight in Osborne A208 at 7:30PM!

We will talk about what the club does, how to join, and have a cool demonstration about North Korea’s recently leaked operating system, Red Star.

You can access the presentation here
https://docs.google.com/presentation/d/14VtGD_0yZzn0P1W650rJg7W2fxYG-xCCYxqiSSxqxtg/edit?usp=sharing

You can access the files we used here
https://drive.google.com/open?id=0B9pM7c8mX0FvUXpRY2J0Q0NrVEU&authuser=0

Hope to see you all tonight!

 

Sam

PeakChaos Spring 2015 Kickoff

Hope you all had a great break.  We are doing some different things in 2015, first of which is using this website to post information easily.

This semester, we will be meeting weekly on Thursday nights at 7:30PM in Osborne A208.  You can find the list of topics here:
https://drive.google.com/open?id=1lod42QidO-Pvb5p-e36KO3Hkzn3AW70CjOmeUIkt7co&authuser=0

 Hope to see you guys soon!  I will continue to update the website and make changes so that it is more useable and friendly.

 

Sam

PeakChaos Presentation on Stuxnet

We will be holding a presentation about Stuxnet and doing some static memory analysis of the attack during our regular meeting on 2/6/2014 in Osborne A208 @ 7:30pm.

If you can, bring a laptop running Windows with you. Additionally, download the files beforehand, that’ll save you some time in the lab.
Come by and check it out!

PeakChaos places 16th overall in iCTF 2013

Last week on December 6th, 2013 we participated in iCTF 2013, hosted by UCSB.  The theme of the competition was to build and launch nukes against each other’s teams, which was accomplished in several stages by collecting points.  Overall, the competition built upon the ideas developed for iCTF 2012, where a large portion of the infrastructure was hosted in VMs on UCSB’s systems, rather than having each team host their own vulnerable boxes as has been done traditionally.  Attacks were developed in python, which were then submitted to UCSB, who launched the attacks on behalf of the teams.  Defense was accomplished by patching services, or alternatively by identifying incoming attacks and reporting them to the hosts.

At the end of the day, we placed 16th out 123 teams participating worldwide, and 4th out of 44 US-based teams.  This is a large improvement over our past performances.  We’re looking forward to next year’s competition and the new challenges it will bring.