Category: Competitions (page 1 of 2)

Let’s participate!

Cybersecurity Competitions 101

Joins us on 27th September to learn about the exciting competitions that our cyber teams are participating this year. Learn how you can be part of this adventure. Pizza and drinks will be there as always. We are moving our meetings to Prescott 215 from now on.meeting3

CyberEagles Advance to South East Collegiate Cyber Defense Competition

Congratulations, CyberEagles!

CyberEagles have recently competed in a qualifying cyber defense competition and advanced to the regional South East Collegiate Cyber Defense Competition (SECCDC)!

SECCDC is about applying cybersecurity skills in real IT business environment. The main goal of this competition is to configure and sustain IT services while preventing and mitigating real cyber attacks from cybersecurity professionals. Our team had to compete with 26 other teams from the South-East region and be one of the top 8 teams to advance to the regional championship that will be held at Kennesaw State University on April 6-7, 2016.

This has been possible due to the Middle Tennessee ISSA Chapter’s generous support.

Members of the team:Middle-TN-ISSA-logo

  • Darren Cunnningham (AD/DNS server)
  • Dustin Gardner (Captain)
  • Hunter Brothers (ESXi server, incident response manager)
  • Konstantin Menako (Email server)
  • Samuel Wehunt (FTP server, co-captain)
  • Shritesh Bhattarai (Web server)
  • Vance “Rip” Trammell (Firewall)
  • Victor Torres (AD/DNS server)

Red Team about CyberEagles Team on SECCDC

We have participated in the SouthEast Collegiate Cyber Defense Competition that lasted for 3 very intense days. Wanna know how we did? Check out the recap of our performance in one of the Red Team members blog whose job was to break in into our network: Samcappella.

Free Online Capture The Flag Puzzles

Puzzle graveyeard contains hundreds of various Capture The Flag tasks – wanna challenge yourself in finding different vulnerabilities? Then go right there!

  • Exploiting SQL vulnerabilities.
  • Reverse engineering files.
  • Breaking steganography.
  • Escalating privileges.
  • Analyzing servers’ logs.
  • Packet capturing.
  • Cryptography.
  • And more!
Older posts

© 2024 Cyber Eagles

Theme by Anders NorenUp ↑