Oregon State University Security Club

UTCTF 2019 – Rogue Leader

Problem Description Our once-venerable president has committed the unspeakable crime of dine-and-dashing the pizza during our own club meetings. He’s on the run as we speak, but we’re not sure where he’s headed. Luckily, he forgot that we had planted a packet sniffer on his laptop, and we were able to retrieve the following capture…
Read more

Meeting Notes – 3/7

Thanks to Kees Cook for an awesome look at kernel security! Kees talked about how the kernel exploit for CVE-2017-7038 was discovered, which allowed privilege escalation due to a heap overflow. You can see his slides here, which also has information for building the POC images for the exploit. This was our last meeting for…
Read more

Meeting Notes 2/28 – OSUSEC Lab

Tonight I talked about the new OSUSEC lab environment! A few systems are currently live, and more will be coming up through the end of the term, including the self-registration system. For information about the lab environment, please see the dedicated page for it.

Meeting Notes 2/21

Tonight we hosted Karl Fosaaen from NetSPI, and he gave an awesome talk on pentesting in an Azure environment. If you’re interested in learning more about this, check out the NetSPI blog or the Azure pentesting book he mentioned. Karl’s post on using Azure RunAs certificates is now live here.

Meeting Notes 2/14

Tonight I went over some basic usage of GDB, IDA Pro, and pwntools for solving the first pwnables on our CTF site. Link to the slides (requires ONID login). The slides have information on getting the tools installed, so if you are having issues with that, check the slides out.

Meeting Notes 2/7

Today we continued discussing reverse engineering and introduced 64-bit assembly. There are more samples on the GitHub repo. The only announcement for today is to RSVP for our upcoming event with NetSPI! They will be coming back on 2/21 to do a presentation on penetration testing, and answer any questions you may have. The RSVP…
Read more

Meeting Notes 1/31

Today we talked about some basic reverse engineering, and compare/contrasting x86 assembly with C code. There are some new challenges up on CTFd, rev[1-4] Link to the slides (requires ONID login)

Meeting Notes 1/24

Tonight we worked on buffer overflows, and some binaries on the new OSUSEC CTF platform. Slides (requires ONID login) Next week, we’re going to work on similar binaries, but comparing the assembly code with the C code.

Meeting Notes 1/17

Tonight we talked about some CTF tools and did a walkthrough for “start” on You can read a detailed writeup for this binary on the OSUSEC GitHub. Here’s a link to the slides (requires ONID login): Slides For those of you who felt lost tonight, my apologies! I received some great feedback, and will…
Read more

NSA Codebreaker 2018 – Task 7

Refunds – (Smart-Contract Development; Vulnerability Analysis; Exploit Development)