Attending GAP Decoded!

The GAP Decoded event was a very interesting and fun tabling event where The Hacking Club members got to experience firsthand the different components of an IT department at a large company. Other than all of the free items we got, including a web cam cover, gloves that let you use a touchscreen, bottle-opener sunglasses, and enough candy to give a kid diabetes, we actually learned a lot at that event.

GAP is a clothing company that uses a lot of technology in its effort to be a leader in the IT world. We were introduced to the many potential upcoming technologies that GAP may be implementing in the future. One of the interesting parts of the event was the fact of how much influence focus group tests have on the implementation of a product or idea. As computer science/computer engineering students, we are very familiar with unit tests, but we never considered user tests.

One example of GAP determining whether a product gets created or even implemented is when they considered if a user’s shopping cart (clothes they wanted to buy online) should be placed in a changing room when they enter a brick-and-mortar store. The main question wasn’t if the concept was possible (it is very possible); rather the question was if it is “creepy”. We never really considered the users’ feelings when the idea was introduced. Our immediate reaction was how would we personally design or implement the concept in terms of code.

As part of the Hacking Club, we have to consider the human in front of the computer to find the flaws or vulnerabilities. The GAP Decoded event was the Hacking Club’s first tabling event in terms of industry. If there is one thing that we will take from it, it is that the programs we design are for human, regular humans, not other programmers. Networking and meeting people is the key to success, not just for computer science, but in life. GAP Decoded taught us a lot and it was definitely an event we would recommend and go back to. Hopefully, one or more of our members gets a GAP internship for the summer!

We got hacked by Hak5!

Holy moly, look at that turn out!!

Holy moly, look at that turn out!!

Our first event was a huge hit! Thank you all for coming out and supporting us, we hope you were able to learn a lot from Hak5. For those of you that couldn't make it out this time around, there will be more chances this semester! This event was centered around wifi hacking, essentially allowing us to understand the flaws in some of the habits we have that are based around how we use our electronic devices and using devices like the Wifi Pineapple to show how easy these flaws can be easily hacked. One of these main flaws pointed out that people that are like "Grandma" have made habits in technology based around easier/quicker access, making our devices much more susceptible to vulnerability.

The unknowingness of the consequences regarding easy access to the internet has allowed many people to be targeted. This is so bad that Darren and Shannon from Hak5 even showed us a video on a real bank robbery. In this video, a man dressed in a suit with a fake badge comes into a bank with the USB Rubber Ducky and takes information from all of the computers there. When asked what he was doing there, he said he was doing a USB audit and since the people working there did not know much about hacking or even computers in general, they trusted him since he was wearing a suit and allowed him to infiltrate the main system by bringing him to the data center room. This video highlights the flaws in easy accessibility.

We hope you all were able to get something out of this event and hope to see you again some time in the coming weeks!

Also sidenote, we are now on discord! Please contact president[AT]

Our final event for the semester was a blast!

Thank you to those that came to our event, Popping Shells and Taking Names, this event was only successful because you were there. We at the GatorHack hope that you all found this event very informative and use this new knowledge in a way that will further the field of security.

To those that were unable to attend, this event was a workshop of how to exploit a server on the same network. We used Kali-linux to attack a Metasploitable Server which was run on a Virtual Machine via VirtualBox. Instructions for all the things we did are posted on our blog.

This was the last event for the Spring 2016 Semester at SFSU. We hope that you all continue to come and participate in future events. Follow us on all social media to receive updates about the club and future events.

Once again, Thank you to those that came and participated. To everyone, Good luck with finals, we’ll see you all in the near future. 
- The Gator Hack Team.

We captured that flag!!

Last week we hosted our PicoCTF event where many of our members had to work in different groups as teams to overcome many of the challenges the game presented to us.

Some of these challenges tested our abilities of creativity, technicality, and even how well we could use Google at our advantage. Some of these challenges were to decrypt, hack, break, or even reverse engineer to solve the problems.

It was a great learning experience for many of us and our next event surely will be too. This upcoming event will take place on May 11th at 4PM-6PM in SCI 256. More details in the link below:

Our 2nd event was phenomenal!!

Thanks to those of you who came out to our “How to be a Security Ninja in 30minutes”. The event was huge success. Topics covered were GPG/ PGP Encryption, Off the Record Messenger Services, Virtual Private Networks(VPNs), Tor,  Text Message Encryption via Open Whisper, and much more. Slides and videos will be posted soon. A shout out to Chris for putting that presentation together, the event wouldn’t have been a success without him. Our next event will be on May 4th and it will be a CTF workshop! More details to be announced soon.