Advanced Wireless Hacking
Learn to tinker with WiFi passwords, detect hidden networks, and other WiFi shenanigans in an effort to see how you can protect yourself!
Bashing Windows - Post Exploitation Fun
You've practiced your hacking skills against a beaten up linux machine. How do you think your skills will fare against Windows XP? In this lab, students will have the opportunity to exploit a Windows XP machine and conduct post exploitation mayhem. This will be conducted in an isolated environments where students are free to pound their targets to the ground.
Capture the Flag
Want to play games while learning more about security? Whether you're competitive or not, capture the flag competitions are just for you! We'll take a look at some different CTF's and Wargames, then dig into some challenges.
Come see what a "cloud" really looks like! We'll take a peek at DSU's datacenter.
Drawing with Turtle
Introduce Python with the turtle graphics environment
The Hacker Methodology is a step-by-step process you will follow during a penetration test. Before you can attack a system though you have see what it is vulnerable to. This course will help you understand how to get in to a system and obtain root access
Hacking College: The Student Experience
Ask current DSU students about DSU, college life in general, love advice, life advice, whatever you want to know! No fortune telling
Hanging with Austin
Let's keep working on the projects from the morning programming session with Austin!
Your raspberry pi typically requires a tv/monitor and an HDMI cable. What if you could just access it directly from your computer? Come to this session to get setup!
Intro to Malware
Create a small, simple piece of malware that allows you to control another machine.
Language Generation with Markov Chains
Teach your computer to talk! Use simple artificial intelligence to generate sentences based off of other written works.
Make a Cable
In this elective, you'll learn how to build a working ethernet cable!
We all love minecraft, but what if we could automate it? Using Python and your Raspberry Pi, we'll show you how you can automate your world!
Ah, the ever vulnerable password. Everyone has them, everyone uses them, and most of them are rubbish. In this session the students will learn about strong password techniques and the ideas behind what makes a password vulnerable. They will look at cracking passwords through guessing, brute-forcing, and pulling in the heavy hardware to rip through more sophisticated algorithms. This course will lead users through offline (captured password hashes) and online (against running system) password attacks.
Software Defined Radio
Software defined radios (SDR) are hardware-based antennas controlled by software on a computer. You would be surprised at the information you can gather freely around you by tuning a software defined radio into specific frequencies. In this course, we will look at general principles and setup of SDR, some of the bigger hacks done with SDR, and hands-on intercepting of signals such as: AM/FM radio, over-the-air (OTA) TV, weather radio, tracking airplanes with ADSB, and wirelessly monitoring vehicle tire pressure (TPMS).