By Jason Marcello Why Layer 2? Layer 2 security is often overlooked when thinking about how to secure an environment.…
Using Python to Scrape Emails from Microsoft Outlook and to Determine Potential Malicious Phishing Websites
By Tyler Olexa A Nigerian Prince is willing to offer you millions of dollars if you just click this link,…
Intro to the Fortinet Fortigate 90d: A Comprehensive Overview
By Owen Siebert A Background During my time as a computing security student at the Rochester Institute of Technology,…
Cisco Small Business Switch Vulnerabilities (CVE-2018-15439)
By Nick Walter Introduction Before I dive into the vulnerabilities, it is important to understand what exactly a small…
An Analysis of a Challenge from RITSEC
By Scott Brink This year I had the privilege of being RITSEC’s tech lead. RITSEC is the security club on…
Port Security Attack & Mitigation
By Ali Alamri 1.1. Introduction Before talking about port security we need to mention the operation process of layer 2…
Interfacing With The Obsolete PDSP188x Display
By Jacob Chrzanowski LCD and LED displays have captured my attention ever since LCDSmarty, a parallel port interfacing software for…
WebRTC & VPN Security Leaks
By: Daniel Shen Problem Statement: Web Real-Time Communication (WebRTC) is used on many popular internet browsers. Unfortunately, WebRTC has a…
Running a Simple GPU Program using PyCUDA
By Nicole Holden Over the last couple years, I have written a few fuzzers for various class assignments. Each…
Securing IoT Configuration Deployments Using a Blockchain
By: Michael Rhodes Since the dawn of Bitcoin, blockchain technology has been touted as the future of securing digital transactions.…