Angelina LeeMan in the Middle and ARP SpoofingWhat is a “Man in the Middle” attack?Feb 22, 2019Feb 22, 2019
Angelina LeeIntroduction to LockpickingIt is a common misconception that hackers tend to think outside of the box to deceive their victims, inconspicuously breaking in without…Dec 3, 2018Dec 3, 2018
Angelina LeeThe Stuxnet WormStuxnet was arguably the most sophisticated cyber worm in our modern history. The code used in the malware contained 4 zero days, which is…Sep 19, 2018Sep 19, 2018
Angelina LeeInterest in Cyber SecurityExplain why this job is interesting to you and what skills, qualifications, or job requirments they list.Aug 29, 2018Aug 29, 2018
Angelina LeeMy Cyber Security Role ModelMy cyber security role model is Lieutenant in the Navy, Robyn Misaye Garner.May 17, 2018May 17, 2018
Angelina LeePicoCTF: KeyzWhile webshells are nice, it’d be nice to be able to login directly. To do so, please add your own public key to ~/.ssh/authorized_keys…May 17, 2018May 17, 2018
Angelina LeeClient-Server-Socket ProgramA client-server-socket program is made up of three components — a client, a server, and a socket (duh). The client is the machine that…Apr 3, 2018Apr 3, 2018
Angelina LeeCyber Patriot State Round — GoldOur team decided to compete on Saturday, January 20, 2018, from 1:00pm to 7:00pm. We timed it perfectly to start at 1:00pm so we could end…Jan 23, 2018Jan 23, 2018
Angelina LeeBasic Configuring of Networking DevicesWhat do you need to set up the Hardware?Nov 10, 2017Nov 10, 2017