While we strongly encourage participants in the society to buy a membership, it's important that interested individuals have the opportunity to trial a session before joining. To that end, we offer one free session a year to non-members; simply email us at [email protected]sheffield.ac.uk and we'll add you to the list for that week.
Our regular sessions are hosted on Blackboard Collaborate, every Monday at 19:00 - 20:30 (ish). Members will be given access to our Blackboard Collaborate Organisation, from which they can view all sessions and recordings. If you've requested a guest session and want to attend online, we'll send you a direct link.
For step by step instructions on accessing our sessions and recordings, click here.
Our bakery-themed CTF, featuring challenges for players of all skill levels, and a chance to win a Raspberry Pi and a SESH hoodie!
An exploration of the airwaves! Come along to learn some Wireshark snooping, MAC spoofing, and WiFi cracking.
A look into reverse engineering and modifying binaries.
Mike Jones, a reformed ex-member of the Anonymous hacking group talks about his experiences! You won't want to miss this talk
Vote for the next committee members!
A quick dive into reverse engineering games and making them misbehave. You might want to brush up on your assembly for this one.
A deeper dive into some web hacking techniques covered in first semester, and some brand new ones - from SSTI to Deserialisation!
A guide to creating and deploying a Capture the Flag challenge using AWS and Flask!
A walkthrough of the Academy machine on HTB.
An overview of assembly code & computer memory, and a couple of demos!
Focussing mainly on phishing, this session will show you techniques used for launching an effective phishing campaign and then how to best prevent one.
A look at the technologies behind VPNs and Tor, their vulnerabilities, and how to setup your own.
Our final session of the semester! We'll tackle TryHackMe's advent of cyber challenges in a laid-back session, and there may even be some prizes up for grabs...
Put your skills to the test! Drawing together everything you’ve learned from throughout the semester, join our committee in an applied hacking challenge from Hack The Box. Come ready to contribute ideas or even with your own machine to follow along!
Open Source Intelligence and social engineering are often one of the most important parts of cyber attacks and defense. Join us to learn about various tools and take part in a CTF.
What would happen if a user can access the administrator control? This week, we will look into what privilege escalation is, what is the purpose of this attack and what are the ways of doing it. We will also explore some demos about getting root access on Linux.
Dive into the world of enumeration - from discovering devices and services on a network and scoping out a way in, to finding paths for lateral movement and escalation vectors, we'll show you some of the most crucial tools and techniques.
This week we will be looking into the different kinds of shells that are available on Linux, what they do, how they work and how we can use them to gain access to remote machines. We will also be looking into port forwarding and the capabilities of Metasploit!
Hacking as a discipline wouldn’t really exist if you had to cart a keyboard with you to every machine you wanted to break into – computer networks enable remote machines to communicate with each other and make things like the Internet possible. This session will explore both the theory behind these networks and some of the practical tools for exploring and understanding them.
This week we’ll be looking at automation, one of the most crucial tools for cybersecurity; whether it’s repeating menial tasks, or rebuilding a common tool to understand how it works. We will take you over some tools we have written, and show you how they can be used on things like Juice Shop!
Chris will be in this week to talk us through some of the career opportunities available with the police! Make sure to come along to this one to hear about an exciting area of work and make some new links with industry professionals! You can sign up with this link if you are not already a member. If you are a member, you should be able to see the room in Blackboard Collaborate.
OWASP (Open Web Application Security Project) Juice Shop is an intentionally vulnerable web application that shows off multiple common and advanced exploits that can appear in web applications. Learn how the vulnerabilities exist and how to exploit them yourself. This will be a more advanced follow up from the GIAG session.
Learn how to use the Linux terminal, a vital tool of developers and cybersecurity professionals alike. Control local and remote machines by mastering the fundamental commands and test your newfound skills by breaking into the Bandit machines hosted by OverTheWire.
OWASP (Open Web Application Security Project) Juice Shop is an intentionally vulnerable web application that shows off multiple common and advanced exploits that can appear in web applications. Learn how the vulnerabilities exist and how to exploit them yourself. More details here