Profile cover photo
Profile photo
Michael Lisi
7 followers -
Full-time security researcher, student, and geek
Full-time security researcher, student, and geek

7 followers
About
Posts

Post has attachment
CNY Hackathon Spring 2017 Review - Part 3
This is the final installation for the CTF challenge discussion from the CNY Hackathon Spring 2017 Event. For part 1, go here:  Part 1 For part 2, go here: Part 2 This will cover the Programming and Exploit Challenges: programming-1 exploit-2 exploit-3 expl...

Post has attachment
CNY Hackathon Spring 2017 Review - Part 2
This is a continuation of the CTF challenge discussion from the CNY Hackathon Spring 2017 Event. For part 1, go here: Part 1 This will cover the Miscellaneous Challenges: misc-1 misc-2 misc-3 Misc-1 Challenge: When attempting to access the link for the misc...

Post has attachment
CNY Hackathon Spring 2017 Review - Part 1
This past weekend marked the latest iteration of the Central New York Hackathon. For those unfamiliar, the CNY Hackathon is a computer security competition where students compete in a variety of events held every semester either at Mohawk Valley Community C...

Post has attachment
Derbycon CTF Crypto Challenge
I tried avoiding the Derbycon CTF. I really did. With more than 18,000 flags available, I knew that if I got sucked in, I'd have to go all in for the weekend. But the allure was too much. I dedicated a few hours on Saturday to checking out a few of the chal...

Post has attachment
BSides Rochester Crypto Challenge
I suppose it's time to recap this year's crypto challenge from the BSides Rochester conference. One of my main goals this year was to solve the crypto challenge for the third straight year. As usual, there were a handful of us working together throughout th...

Post has attachment
BSides ROC 5 - Follow Up
First off, I really wanted to thank everyone that stopped by to check out my talk. I think I finally understand how to properly use the microphone, and I apologize for anyone that had trouble hearing me. That being said, I 'm posting below a number of refer...

Post has attachment
2014 BSides ROC / Crypto Challenge Write-Up
It's crazy to think that a year's gone by already since last year's BSides Rochester conference. I attended again this year, this time it was located at the German House, which I thought it was a solid venue to host the conference. And, while there were no ...

Post has attachment
Thoughts on ISTS 11
Somewhere around the middle December, I was asked by my coworker Anthony ( @_s1lentjudge ) if I wanted to participate in RIT SPARSA's Information Security Talent Search (ISTS) competition, which I had heard of but wasn't entirely familiar with. I agreed, an...

Post has attachment
Playfair Encryption/Decryption
I'm currently in the middle of a Grad course in Secure Protocols. In the first weeks of the course, we discussed a
number of encryption methods used over the years to secure messages passed
between entities. These included the Caesar Cipher, the Affine Caes...
Wait while more posts are being loaded