CS373 Spring 2020: Alice Reuter Week3

1. What did you do this past week? Last week, I turned in the Collatz assignment, I finished my multicore project and I took a linear algebra exam. It was pretty busy academically so I didn’t have a lot of free time. I’ve started getting into meal prepping which has been fun. 2. What’s in your way? Not much, I just have to start working on things. 3. What will you do next week? …

Posted on

CS373 Spring 2020: Alice Reuter Week 2

1. What did you this past week? This past week, I worked on my linear algebra homework. I also saw the prescreening of the DC Comics Birds of Prey movie which I enjoyed. This weekend I’ve mostly been working on our capabilities implementation for my multicore class. Capabilities are a way of doing access control and permission to access contiguous memory regions and other resources are granted at the process level. …

Posted on

CS373 Spring 2020: Alice Reuter Week 1

1. What did you do last week? I finished milestone 0 for my multicore operating systems class. All we had to do was blink an led on the circuit board but it took a while to get used to low-level programming and reading manuals. I also started to look at the collatz project for this course. 2. What’s in your way? I’m trying to better understand the requirements for this class. …

Posted on

CS373 Spring 2020: Alice Reuter Intro

1. Purpose of this post This is my first post as part of a series for CS373 Software Engineering with Professor Glenn Downing. This is an introduction to me and my web development experience. 2. Why are you taking Software Engineering? I signed up for software engineering because it has a strong reputation among UT students. I also wanted to work on my ability to build software as a team. …

Posted on

CPTC 2019 Report

Competing at the Collegiate Penetration Testing Competition was a great opportunity to experience realistic security work. UT placed second in the North East Regionals. I was responsible for working on the windows boxes. Finding an anonymous FTP server gave me access to windows back-ups. From these back-ups, I was able to extract ssh keys. The FTP server allowed the use of the PORT command, which allowed me to perform an FTP bounce attack. …

Posted on

Microcorruption

Micorruption is a series of reverse engineering challenges. In each stage you disable a lock by reverse engineering it. Here’s how I approached each stage of the challenge. Johannesburg This stage is an extension of the Cusco stage. The overview states: - A firmware update rejects passwords which are too long. - This lock is attached the the LockIT Pro HSM-1. Since the password verification occurs on the hardware module, we have to find another way to exploit it. …

Posted on