Who We Are
We are the Hacking Club at the University of Birmingham. We get together every week to look at offensive hacking and cyber security. We do this because understanding threats and how attackers think is the best way to keep computers secure... also it's fun.
Any problem can be solved by enough monkeys acting completely at random.
All students are welcome, we can find hacking challenges that are appropriate for every skill level, however you must bring a laptop.
We meet every Wednesday during term time, in either room 217 or the Sloman Lounge, Computer Science building, from 3pm. If you want to confirm, drop Andreea an email. Check the calendar below, events mention the room they are taking place in!
Below you can find info on what we will be doing in the upcoming sessions. Important CTFs in which we will participate are also mentioned.
|1||WireShark||Network||A network packet sniffer and analyser.|
|2||IDApro free version (V7.0) and Evaluation version||Disassembler||IDA pro cheat sheet|
|6||0xED (Mac OS).||Hex Editor|
|7||Burp Proxy||Web App||An intercepting proxy|
|8||GDB||The GNU Project Debugger|
Some learning resources and training exercises can be found below:
|1||Damn Vulnerable Web App||Web App||A Web App pen-testing tool|
|2||VulnHub||Collection of vulnerable VMs|
|3||WarGames by OverTheWire|
|4||Smash the Stack|
|5||Google Gruyere||Web app|
|9||Immersive Labs||Digital Cyber Security training platform|
|12||pwnable.kr||System exploitation all the way!|
|13||EnigmaGroup||Great for self-leaning. Good mentoring support.|
|14||Pentesters lab||Web hackings -- some labs are free|
|15||CTF Practice||Misc||Links to a lot of hacking websites|
|16||Pentestmonkey||Cheat Sheets||Some explanations towards pentesting and cheat sheets for SQL/shell injection|
|17||Metasploit Unleashed||Best Metasploit resources|
|18||Azeria Labs||ARM RE and exploitation. Learning materials and exercises|
A full list of write-ups for competitions we have participated in can be found here.
For submitting write-ups, please use this template if you want the file hosted on our site, or the external template if you plan to host the write-up on your own website. The format is Markdown. There are some explanations included in the files. Send them by email or submit a Git pull request.