About Us

Cyber Team

Areas of Focus

Linux

Created in 1991, Linux is a free and open-source operating system that is based on the Unix operating system and is one of the most widely used operating systems in the world, powering everything from personal computers, servers, and mobile devices. Linux is known for its stability, security, and flexibility, as well as its vast array of available software and tools. It is widely used in the tech industry and is favored by many developers and system administrators due to its command-line interface and powerful scripting capabilities. Using this platform allows team members to become familiar with widely available tools that Linux utilizes and how they may be leveraged by attackers, as well as giving the opportunity to team members to learn about system configuration in the Linux operating system.

Digital Forensics

Digital forensics is the process of collecting, analyzing, and preserving digital evidence in order to investigate and prevent cybercrimes. It involves using specialized tools and techniques to extract information from digital devices such as computers, smartphones, and other digital storage media. Digital forensics can be used in a variety of situations, such as investigating cyberattacks, data breaches, intellectual property theft, and online harassment.  Team members learn to utilize tools to analyze data such as packets or logs to detect malicious or criminal behavior from possible adversaries and will gain a better understanding of network communications and computer systems.

Reverse Engineering

Reverse Engineering is the process of analyzing a product, system, or software in order to understand how it works. This process involves taking apart a product, examining its components and their relationships, and figuring out how they interact with each other. Reverse engineering can be used for a variety of purposes, such as understanding how a competitor’s product works, improving upon an existing design, or identifying vulnerabilities in software or hardware. Team members will utilize tools to see how a program operates, typically in order to exploit any available vulnerabilities that may be present.  Not only does this teach members to better understand the logic of how to analyze programs and processes, but also teaches team members how to better secure their own programs.

Binary Exploitation

Binary exploitation is a type of computer security attack that targets vulnerabilities in binary code, such as compiled software programs or operating system components. The goal of binary exploitation is to take advantage of flaws in the code to gain unauthorized access or control over a computer system or application. This can involve exploiting buffer overflows, format string vulnerabilities, or other weaknesses in the way that the code handles input and output. Team members will learn to use a variety of techniques to exploit these vulnerabilities, such as injecting malicious code, manipulating memory, or executing arbitrary commands. Binary exploitation can be used to bypass security measures, steal sensitive data, or take control of a system for malicious purposes.

Penetration Testing

Penetration testing, also known as “pen testing”, is the process of evaluating the security of a computer system, network, or web application by simulating a cyber attack. The goal of a penetration test is to identify vulnerabilities and weaknesses that could be exploited by attackers, and to provide recommendations for improving security. Team members will learn how to conduct penetration testing using a variety of tools and techniques, such as network scanners, vulnerability scanners, and social engineering tactics. Penetration testing is an important component of an overall security strategy and can help organizations stay ahead of evolving threats.

Cryptography / Steganography

Cryptography is the practice of secure communication in the presence of third parties. It involves the use of mathematical algorithms and keys to encrypt and decrypt messages, ensuring that only authorized parties can read the message. Cryptography is used in a variety of applications, such as securing internet transactions, protecting sensitive data, and creating secure communication channels. Steganography is the practice of hiding secret information within non-secret information, such as images, audio files, or text messages. Steganography is often used in combination with cryptography to provide an additional layer of security. Team members will learn how to utilize these concepts in order to secure their own information/communications, as well as how to exploit faults in some practices in order to uncover data.

Scripting / Software Development

Scripting is the process of writing code in a high-level scripting language, such as Python or Perl, to automate tasks or perform simple operations. Scripts are often used for tasks such as system administration, data processing, and web development. Software development is the process of designing, creating, and maintaining software applications. Software development typically involves writing code in a programming language such as C++, Java, or Python, and compiling it into a binary executable file that can be run on a computer.

Sample Weekly Schedule

Team Presentations

Presentation from Varsity team members. These presentations can showcase projects, research, or maybe a challenging problem from the last CTF.

Monday

Self-Led Learning

Free work days on the cyber team can be spent looking into personal interests, or competing in small locally hosted competitions on the team like KOTHS and OWASP Juice Shop.

Tuesday

Mentoring

On Wednesday, we have a video chat with an officer from Coast Guard Cyber Command. The Cyber Team frequently networks with officers from Coast Guard Cyber, CISA, and other organizations. We talk about careers, competitions, and skills.

Wednesday

Workouts & Workshop

On Thursday we start strong with a morning workout, then after school dive into learning about reverse engineering a binary program with one of our coaches. Presentations take into account varrying skill gaps and go over beginner problems, as well as more challenging problems for those more experienced.

Thursday

Free Work Day

Fridays are usually free work days. On long weekends, liberty is sometimes granted before practice, but you'll find dedicated team members there regardless.

Friday

Travel & Compete

Saturday we wake up and attend a morning workout then we may travel for an in person competition, or gather in the team room for an online competition.

Saturday

Training Resources

Try Hack Me

Hands-on hacking for all skill levels Learn cyber security with fun gamified labs and challenges

Hack the Box

Upskilling cyber superhumans
since 2017.

Cyber Skyline

Level up your team's cybersecurity skills with hands-on technical challenges for today's threats.

Sans

Cybersecurity Courses
and
Certifications

Team Room

Most of our practices are held in the Cyber Team room. Here we have various workstations and a collaborative environment to work on solving challenges, hosting presentations, and having an all-around good time.