There should be a separate tab displaying information about who we are and what we do. Some information to be included:
We are the Queen's Network design team. We teach and go through exercises relating to scanning the network, packet sniffing, exploiting vulnerable machines, SQL injection, XSS, brute force password cracking, firewalls and more.
Competitions
We host an internal CTF (capture the flag) competition where 2 teams attack and defend their networks from each other while trying to break into the machines and steal the tokens.
Another competition is the CDX (cyber defence exercise) hosted by RMC where a similar attack/defend style of exercise is held.
Projects
Currently the main project being worked on is this website. Any members are welcome to work on development, regardless of web development skills. Here they have a chance to put their cyber security skills to work. Whenever a new potentially insecure feature is produced, members will try to find exploits in the site to either login without valid credentials, steal potentially sensitive information, or gain root access to any of the servers.
There should be a separate tab displaying information about who we are and what we do. Some information to be included:
We are the Queen's Network design team. We teach and go through exercises relating to scanning the network, packet sniffing, exploiting vulnerable machines, SQL injection, XSS, brute force password cracking, firewalls and more.
Competitions
We host an internal CTF (capture the flag) competition where 2 teams attack and defend their networks from each other while trying to break into the machines and steal the tokens.
Another competition is the CDX (cyber defence exercise) hosted by RMC where a similar attack/defend style of exercise is held.
Projects
Currently the main project being worked on is this website. Any members are welcome to work on development, regardless of web development skills. Here they have a chance to put their cyber security skills to work. Whenever a new potentially insecure feature is produced, members will try to find exploits in the site to either login without valid credentials, steal potentially sensitive information, or gain root access to any of the servers.