This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
start [2019/09/15 17:11] acm [Resources] |
start [2019/10/23 10:16] (current) acm [Resources] |
||
|---|---|---|---|
| Line 4: | Line 4: | ||
| {{: | {{: | ||
| What a beautiful image. | What a beautiful image. | ||
| + | ===== What is the Cyber Ambassador Program ===== | ||
| ===== Code of Conduct and Ethics Statement ===== | ===== Code of Conduct and Ethics Statement ===== | ||
| I _______ do solemnly \\ | I _______ do solemnly \\ | ||
| Line 17: | Line 18: | ||
| or purpose of evasion. \\ | or purpose of evasion. \\ | ||
| By these things, I stand. \\ | By these things, I stand. \\ | ||
| + | |||
| + | I can /* not */ see this. | ||
| ===== Meetings and Events ===== | ===== Meetings and Events ===== | ||
| Line 22: | Line 25: | ||
| ===== Resources ===== | ===== Resources ===== | ||
| - | | + | === Our Github === |
| - | * NDM3OTYyNjU3MjQzNjg2NTY2MjA2OTczMjA3NjY1NzI3OTIwNjg2NTZjNzA2Njc1NmM= | + | |
| + | |||
| + | === Our Hackable Website === | ||
| + | * [[http:// | ||
| + | * 6 Challenges | ||
| + | * 5 Flags in form of " | ||
| + | * 1 password to crack | ||
| === Vulnerable Machines and Training === | === Vulnerable Machines and Training === | ||
| - | * https:// | + | |
| - | * http:// | + | * http:// |
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | |||
| + | === Common Tools and Usage === | ||
| + | * [[metasploit|metasploit]] | ||
| + | * [[nmap|nmap]] | ||
| === Binary Exploitation === | === Binary Exploitation === | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| === Cryptography === | === Cryptography === | ||
| + | * [[https:// | ||
| + | * NDM3OTYyNjU3MjQzNjg2NTY2MjA2OTczMjA3NjY1NzI3OTIwNjg2NTZjNzA2Njc1NmM= | ||
| === Web Exploitation === | === Web Exploitation === | ||
| + | * Sometimes website have //secret// pages | ||
| + | |||
| + | === Buffer Overflow and Binary Exploitation === | ||
| + | * [[https:// | ||
| === Privilege Escalation === | === Privilege Escalation === | ||
| + | * [[https:// | ||
| - | === Full System Exploitation Challenges | + | === Other CTF and Hacking Team Pages === |
| + | * [[https:// | ||
| + | === Competitions === | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | |||
| + | === Books === | ||
| + | * Contact Brayden Faulkner about access to the Cyber Ambassador Library | ||
| ===== Contacts ===== | ===== Contacts ===== | ||
| Line 45: | Line 82: | ||
| Chris Humphreys | Chris Humphreys | ||
| chrchump@ut.utm.edu | chrchump@ut.utm.edu | ||
| + | |||
| + | < | ||
| + | hello? | ||
| + | </ | ||