User Tools

Site Tools


Cyber Buffet


This is an IN-PERSON track on the Collin College campus


We will cover five classes worth of material in a week: Creating attack tools with Python, Cryptography and Cryptocurrency, Threat Intelligence & Incident Response, Exploit Development, and hacking spacecraft and satellites. There are many hands-on projects for each topic, ready to be inserted into your classes.

This workshop is structured as a Capture-The-Flag competition, so each participant can proceed at their own pace. The techniques will be briefly demonstrated, and we will provide tips and help as needed to make sure everyone is able to solve at least some of the challenges.

The participants will not all learn the same thing, but will each learn something new and useful.


Participants should understand networking and security at the Net+ and Security+ level. No programming experience is required.


All the software used is freely available, and all the projects are copyright-free and available freely on the Web. No textbooks are required.


Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, Black Hat USA, HOPE, BSidesSF, BSidesLV, RSA, and many other conferences and colleges. He founded Infosec Decoded, Inc., and does corporate training and consulting for several Fortune 100 companies, on topics including Incident Response and Secure Coding.

Formal education: B.S. and Ph.D. in Physics

Industry credentials:

  • Infosec: CISSP, Certified Ethical Hacker, Security+, Defcon Black Badge, Splunk Core Certified User
  • Networking: Network+, Certified Fiber Optic Technician, HE IPv6 Sage, CCENT, IPv6 Forum Silver & Gold, Juniper JN0-101, Wireshark WCNA
  • Microsoft: MCP, MCDST, MCTS: Vista

Course Objectives

At the completion of this track, the participants will be able to…

  • Develop simple Python tools to perform network and cryptographic attacks
  • Gain experience with essential incident response tools
  • Understand Bitcoin, Ethereum, and smart contracts and how to secure them
  • Develop exploits for Windows and Linux systems at the binary level


Click here for the program schedule and times.

Monday, July 11: Violent Python 3
Level: Beginner

Even if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. We build tools that perform port scanning, brute-force attacks, crack password hashes, and XOR encryption. Python is among the top three programming languages in the world, for good reason: it's the easiest language to use for general purposes.

Participants need only a computer and a Web browser. No previous programming experience is required.

Tuesday, July 12: Cryptography and Cryptocurrency
Level: Beginner

Learn how blockchains, cryptocurrency, coin offerings, and smart contracts work in a series of challenges. We will also cover the underlying cryptography: hashes, symmetric encryption, and asymmetric encryption. We will configure wallets, servers, and vulnerable smart contracts, and exploit them.

We will configure systems using Bitcoin, Ethereum, Hyperledger, Multichain, Stellar, and more. We will perform exploits including double-spend, reentrancy, integer underflow, and logic flaws.

No previous experience with coding or blockchains is required.

Wednesday, July 13: Threat Intelligence & Incident Response
Level: Beginner

Learn how to gather threat intelligence from public feeds using STIX and TAXII and use them to protect users from attacks with a proxy server.

To handle attacks that do get through, learn how to use these tools for incident response:

VirusTotal and PacketTotal
Debuggers: OllyDbg and x64dbg
Disassemblers: IDA Pro and Ghidra

No previous experience with these tools is required. A Network+ and Security+ level of networking and security knowledge is recommended.

Thursday, July 14: Introduction to Exploit Development
Level: Intermediate

Learn how to take control of Windows and Linux servers running vulnerable software, in a hands-on CTF-style workshop. We begin with easy command injections and SQL injections, and proceed through binary exploits incuding buffer overflows on the stack and the heap, format string vulnerabilities, and race conditions.

After this workshop, you will understand how memory is used by software, and why computers are so easily tricked into executing bytes as code that entered the system as data.

We will exploit 32-bit and 64-bit Intel systems, and also ARM-based systems. We will examine modern Windows defenses in detail and how to defeat them, including ASLR, DEP, stack cookies, and SEHOP.

Previous experience with C and assembly language is helpful but not required.

Friday, July 15: In Space, No One Can Hear You Hack
Level: Beginner

Learn how satellites move and how they communicate. We will collect data from satellites, decode it, and generate visible images. We will cover these topics:

Tracking satellite passes with Two Line Elements
Decoding APT signals
Using GNU Radio and Python to decrypt signals
Decoding BPSK signals
Collecting signals from remote locations with WebSDR
Collecting live signals with a quadrifilar helix antenna
Configuring ION-DTN (Delay Tolerant Networking)

Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.

cyber.txt · Last modified: 2022/05/13 15:47 by admin