October 21, 2018

V.A.S.T.

VAST-SIP

Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received. To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney. Will and a four other Network Security put their heads together for their Student Innovation Project and created…

DEF CON 24

DEFCON Hacking Conference

DEF CON is one of the oldest and largest continuously running hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. All events at DEF CON were conceived by the attendees. Some people play capture the flag the entire time, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all the talks….

DEF CON 23

DEF CON 2015

DEF CON is one of the oldest and largest continuously running hacker conventions around. UAT is making yet another appearance at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. Virtually all events at DEF CON were conceived by the attendees. Some people play capture the flag 24×7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking,…

New Methods of Attack?

Back in the late 90’s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…