Advanced Wireless Hacking

Learn to tinker with WiFi passwords, detect hidden networks, and other WiFi shenanigans in an effort to see how you can protect yourself!

Bashing Windows - Post Exploitation Fun

You've practiced your hacking skills against a beaten up linux machine. How do you think your skills will fare against Windows XP? In this lab, students will have the opportunity to exploit a Windows XP machine and conduct post exploitation mayhem. This will be conducted in an isolated environments where students are free to pound their targets to the ground.

Capture the Flag

Want to play games while learning more about security? Whether you're competitive or not, capture the flag competitions are just for you! We'll take a look at some different CTF's and Wargames, then dig into some challenges. 

Datacenter Tour

Come see what a "cloud" really looks like! We'll take a peek at DSU's datacenter.

Drawing with Turtle

Introduce Python with the turtle graphics environment

Hacker Methodologies

The Hacker Methodology is a step-by-step process you will follow during a penetration test. Before you can attack a system though you have see what it is vulnerable to. This course will help you understand how to get in to a system and obtain root access

Hacking College: The Student Experience

Ask current DSU students about DSU, college life in general, love advice, life advice, whatever you want to know! No fortune telling

Hanging with Austin

Let's keep working on the projects from the morning programming session with Austin!

Headless Pis

Your raspberry pi typically requires a tv/monitor and an HDMI cable. What if you could just access it directly from your computer? Come to this session to get setup!

Intro to Malware

Create a small, simple piece of malware that allows you to control another machine.

Language Generation with Markov Chains

Teach your computer to talk!  Use simple artificial intelligence to generate sentences based off of other written works.

Make a Cable

In this elective, you'll learn how to build a working ethernet cable!

Minecraft Pi

We all love minecraft, but what if we could automate it? Using Python and your Raspberry Pi, we'll show you how you can automate your world!

Password Cracking

Ah, the ever vulnerable password.  Everyone has them, everyone uses them, and most of them are rubbish.  In this session the students will learn about strong password techniques and the ideas behind what makes a password vulnerable.  They will look at cracking passwords through guessing, brute-forcing, and pulling in the heavy hardware to rip through more sophisticated algorithms.  This course will lead users through offline (captured password hashes) and online (against running system) password attacks.

Software Defined Radio

Software defined radios (SDR) are hardware-based antennas controlled by software on a computer.  You would be surprised at the information you can gather freely around you by tuning a software defined radio into specific frequencies.  In this course, we will look at general principles and setup of SDR, some of the bigger hacks done with SDR, and hands-on intercepting of signals such as: AM/FM radio, over-the-air (OTA) TV, weather radio, tracking airplanes with ADSB, and wirelessly monitoring vehicle tire pressure (TPMS).