John "Mako" McGill
Discover what's lurking beneath the surface of your operating system! Back with more shark analogies, Mako discusses how we can use the built-in scripting engines in Linux and Windows—Bash and Powershell—to automate and simplify (almost) everything in the NCL, broken down by domain.
Category: NCL-Enumeration & Exploitation
Grace Hopper Celebration (#ghc17) Capture the Flag: Learning to Hack for Fun and Profit
This was the behind-the-scenes, CTF101 workshop that CryptoKait had been looking forward to all week! Her friend and fellow attendee, Lizzie Molloy, took these notes on how to approach CTF challenges, with a focus on cryptography, networks, web apps, and binaries, but the underlying problem-solving strategies are universal.