-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.xml
125 lines (102 loc) · 9.01 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title></title>
<link>https://cybersec.upvision.co/</link>
<description>Recent content on </description>
<generator>Hugo -- gohugo.io</generator>
<language>en-US</language>
<lastBuildDate>Fri, 14 Feb 2020 02:34:17 +0530</lastBuildDate>
<atom:link href="https://cybersec.upvision.co/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>0x01 - segfault</title>
<link>https://cybersec.upvision.co/segfault/0x01/</link>
<pubDate>Fri, 14 Feb 2020 02:34:17 +0530</pubDate>
<guid>https://cybersec.upvision.co/segfault/0x01/</guid>
<description>This workshop was conducted on Wednesday 12th Feb, 2020.
Notes From the Slides CPU Architecture - John Von Neumann Architecture Registers, Control Unit, Memory, ALU C code, assembly, binary compiler and assembler disassembler and decompiler ELF Binary Format Linux expects the binary to follow this format in order to run it. Well documented here System V ABI Specification readelf -h &lt;binary file&gt; gives you header information X86 Assembly The Guide https://www.</description>
</item>
<item>
<title>Reversing a C program</title>
<link>https://cybersec.upvision.co/segfault/reverse-c-program/</link>
<pubDate>Tue, 11 Feb 2020 21:32:10 +0530</pubDate>
<guid>https://cybersec.upvision.co/segfault/reverse-c-program/</guid>
<description>Reversing a C Program It&rsquo;s said C is low level programming language, well that&rsquo;s not true. It became that way because of advancements in new programming languages such as Python, Java, Javascript, Ruby. These run on a VM, thereby incur a heavy abstraction cost.
Now C programs are compiled to assembly, since C have not much syntax sugar it become easy to read the Assembly and figure out the possible C code to it.</description>
</item>
<item>
<title>0x00 - Segfault</title>
<link>https://cybersec.upvision.co/segfault/0x00/</link>
<pubDate>Fri, 24 Jan 2020 00:23:08 +0530</pubDate>
<guid>https://cybersec.upvision.co/segfault/0x00/</guid>
<description>This workshop was conducted on Wednesday 22nd Jan, 2020. This was given to students of first years of all discipline.
Notes From the slides Introduction to field of Reverse Engineering Perspective of a Reverse Engineer to Computer Software Demos Task: Find the default password in password protect valut program Difference b/w Binary file and Text File Using strings from binutls to find the password text in the executable program Task: protostar stack0 exercise Stack Data structure for storing program variables Vulnerability in gets() function as described in the manpage Introduction to Buffer Overflow Exploit.</description>
</item>
<item>
<title>Segfault - Reverse Engineering Workshop series</title>
<link>https://cybersec.upvision.co/events/segfault/</link>
<pubDate>Wed, 22 Jan 2020 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/events/segfault/</guid>
<description>Okay, we were shut for a very long time! Our founders graduated, things were dormant. It&rsquo;s time for a change.
It all started with conversation with a freshman, I told them we had a club and probably we can do a meetup to bring it back. So, I decided to start with a new workshop series which I have given the name - &ldquo;Segfault&rdquo;.
Segfault will be a series of workshops on reverse engineering.</description>
</item>
<item>
<title>CyberSecNITD meetup with IEEE NITD student branch</title>
<link>https://cybersec.upvision.co/events/feb19ieeemeetup/</link>
<pubDate>Tue, 19 Feb 2019 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/events/feb19ieeemeetup/</guid>
<description>Today we collaborated with IEEE NITD Student Branch and organized a Introductory workshop.
Since being an independent club with students of common interest we thought it would be better if we do some serious workshop helping the freshman year students jump into the CyberSecurity Band Wagon!
The crowd we received was impressive! We never had a meetup with such a huge crowd before.
Since we are bunch of students with mediocre GPA trying to bust our keyboard typing out cryptic words what we describe as commands on dumb boring terminal doesn&rsquo;t easily qualify as a Club with organization and publicity, today was important.</description>
</item>
<item>
<title>Root CTF 2018</title>
<link>https://cybersec.upvision.co/events/rootctf18/</link>
<pubDate>Thu, 12 Jul 2018 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/events/rootctf18/</guid>
<description>The time has come to do it again!
Root CTF, a CTF event organized by CyberSecNITD every year in TerraTechnica NITD&rsquo;s Annual Techfest.
The CTF was Jeopardy style and was conducted in offline mode.
We witnessed 11 teams having students from NITD and from other Colleges too. That was a huge progress for us from RootCTF17 where all our participants were students from NITD only.
Since last year&rsquo;s CTF, we got the opportunity to learn more on topics in CyberSecurity.</description>
</item>
<item>
<title>About CyberSec NITD</title>
<link>https://cybersec.upvision.co/about/</link>
<pubDate>Wed, 30 May 2018 19:03:12 +0530</pubDate>
<guid>https://cybersec.upvision.co/about/</guid>
<description>We are group of Cyber Security Enthusiasts with diverse skills working togther to evangelise Computer Security in NIT Delhi.
Founded in Spring Semester of 2017, Mohit approached to Shivam, Vighnesh, Abhay, Parvez as he was in search for students who had experience working on Linux systems to make a team to conduct a Jeopardy style CTF in NITD&rsquo;s annual Tech Fest TerraTechnica 2017. The event was a success and it was the first time TerraTechnica had a CTF event.</description>
</item>
<item>
<title></title>
<link>https://cybersec.upvision.co/slides/0x01/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/slides/0x01/</guid>
<description>0x01 Binary Analysis code{white-space: pre-wrap;} span.smallcaps{font-variant: small-caps;} span.underline{text-decoration: underline;} div.column{display: inline-block; vertical-align: top; width: 50%;} var link = document.createElement( 'link' ); link.rel = 'stylesheet'; link.type = 'text/css'; link.href = window.location.search.match( /print-pdf/gi ) ? 'https://revealjs.com/css/print/pdf.css' : 'https://revealjs.com/css/print/paper.css'; document.getElementsByTagName( 'head' )[0].appendChild( link ); 0x01 - Binary Analysis Segfault - Reverse Engineering Workshop
29-02-2020
Agenda How CPU executes code? Understanding Assembly Language Reversing a C program How CPU executes code?</description>
</item>
<item>
<title></title>
<link>https://cybersec.upvision.co/slides/19feb_introduction_to_cybersec/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/slides/19feb_introduction_to_cybersec/</guid>
<description>Cyber Security code{white-space: pre-wrap;} span.smallcaps{font-variant: small-caps;} span.underline{text-decoration: underline;} div.column{display: inline-block; vertical-align: top; width: 50%;} var link = document.createElement( 'link' ); link.rel = 'stylesheet'; link.type = 'text/css'; link.href = window.location.search.match( /print-pdf/gi ) ? 'https://revealjs.com/css/print/pdf.css' : 'https://revealjs.com/css/print/paper.css'; document.getElementsByTagName( 'head' )[0].appendChild( link ); Cyber Security Vighnesh Sk
19th Feb, 2019
$whoami What?!? CybersecurityDigital Age Forget Guns and Bombs, now we have servers and payloads.</description>
</item>
<item>
<title></title>
<link>https://cybersec.upvision.co/slides/s0w1/</link>
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
<guid>https://cybersec.upvision.co/slides/s0w1/</guid>
<description>Reverse Engineering code{white-space: pre-wrap;} span.smallcaps{font-variant: small-caps;} span.underline{text-decoration: underline;} div.column{display: inline-block; vertical-align: top; width: 50%;} var link = document.createElement( 'link' ); link.rel = 'stylesheet'; link.type = 'text/css'; link.href = window.location.search.match( /print-pdf/gi ) ? 'https://revealjs.com/css/print/pdf.css' : 'https://revealjs.com/css/print/paper.css'; document.getElementsByTagName( 'head' )[0].appendChild( link ); Reverse Engineering Stage 0 Workshop 1
$whoamiVighnesh Sk, CSE 4th year
I don’t hack, linux evangalism, Dev, Maker.
Github: https://github.</description>
</item>
</channel>
</rss>