+
+
+ {% endif %}
{% endfor %}
diff --git a/_posts/2019-06-23-googlectf.md b/_posts/2019-06-23-googlectf.md
new file mode 100644
index 0000000..7f03eb9
--- /dev/null
+++ b/_posts/2019-06-23-googlectf.md
@@ -0,0 +1,18 @@
+---
+layout: post
+title: "I gave Google's CTF a short try and learned a thing or two"
+description: "But exams got in the way and took all the fun"
+date: 2019-06-23 22:04:00
+categories: ctf
+---
+
+Honestly, I completely forgot that this was the weekend of Google's online [CTF Qualifications](https://g.co/ctf) for 2019 and was late, unprepared, busy, and did not have a team to work with.
+
+## What is this event?
+Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.
+
+## What I learned
+Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, `strings`. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. [Ghidra](https://www.nsa.gov/resources/everyone/ghidra/), an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.
+
+## Will I do this again?
+Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.
\ No newline at end of file
diff --git a/_site/all_posts.html b/_site/all_posts.html
index ed4abc2..c327ee2 100644
--- a/_site/all_posts.html
+++ b/_site/all_posts.html
@@ -1,4 +1,4 @@
-
+
+
I am currently taking a class in school called Music and computers (AMM2M), where as part of the class, whe get together into bands, and produce a song. After taking a break from music production for over a year, we have released our song for the class (we do two songs, but the second is not finished yet).
AKA. Why programmer + reddit + matplotlib is a bad idea.
+
+
+
-
-
-
GitHub's CSS is boring. So I refreshed the design
-
-
-
2019-06-12 09:09:00 -0400
-
I have been using GitHub since 2017, and have been getting tired of GitHub’s theme. I didn’t need a huge change, just a small refresh. So, to solve this, I whipped out Stylus and made a nice little CSS file for it.
I gave Google's CTF a short try and learned a thing or two
+
+
+
Honestly, I completely forgot that this was the weekend of Google’s online CTF Qualifications for 2019 and was late, unprepared, busy, and did not have a team to work with.
+
+
What is this event?
+
Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.
+
+
What I learned
+
Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, strings. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. Ghidra, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.
+
+
Will I do this again?
+
Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/_site/feed.xml b/_site/feed.xml
index e591c42..36fbcf5 100644
--- a/_site/feed.xml
+++ b/_site/feed.xml
@@ -1,4 +1,13 @@
-Jekyll2019-06-21T16:12:12-04:00http://localhost:4000/feed.xmlEvan PrattenComputer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.What I have learned from 2 years of FRC programming2019-06-21T11:14:00-04:002019-06-21T11:14:00-04:00http://localhost:4000/frc/2019/06/21/Robot-Experiences<p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p>
+Jekyll2019-06-24T12:06:10-04:00http://localhost:4000/feed.xmlEvan PrattenComputer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.I gave Google’s CTF a short try and learned a thing or two2019-06-23T18:04:00-04:002019-06-23T18:04:00-04:00http://localhost:4000/ctf/2019/06/23/googlectf<p>Honestly, I completely forgot that this was the weekend of Google’s online <a href="https://g.co/ctf">CTF Qualifications</a> for 2019 and was late, unprepared, busy, and did not have a team to work with.</p>
+
+<h2 id="what-is-this-event">What is this event?</h2>
+<p>Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.</p>
+
+<h2 id="what-i-learned">What I learned</h2>
+<p>Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, <code class="highlighter-rouge">strings</code>. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. <a href="https://www.nsa.gov/resources/everyone/ghidra/">Ghidra</a>, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.</p>
+
+<h2 id="will-i-do-this-again">Will I do this again?</h2>
+<p>Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.</p>Honestly, I completely forgot that this was the weekend of Google’s online CTF Qualifications for 2019 and was late, unprepared, busy, and did not have a team to work with.What I have learned from 2 years of FRC programming2019-06-21T11:14:00-04:002019-06-21T11:14:00-04:00http://localhost:4000/frc/2019/06/21/Robot-Experiences<p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p>
<h2 id="my-roles">My roles</h2>
<p>In my first year, I joined the team as a programmer and had a fun time learning about embedded programming and development with hardware. Then, in my second year, I was promoted to programming co-lead along with <a href="https://github.com/slownie">@slownie</a>. I much preferred my second season because I had a better understanding of the technology I was working with, and we got to play with some cool tools throughout the season.</p>
diff --git a/_site/index.html b/_site/index.html
index bae85f0..9414a50 100644
--- a/_site/index.html
+++ b/_site/index.html
@@ -120,6 +120,18 @@
+
+
+
+
+
+