gctf
This commit is contained in:
parent
69865e43a7
commit
bca3bbc7ed
@ -22,11 +22,15 @@
|
||||
{% for post in site.posts %}
|
||||
{% if post.title != 404 %}
|
||||
<header class="major">
|
||||
<h1>{{ post.title }}</h1>
|
||||
<h1><a href="{{ post.url | relative_url }}" class="link">{{ post.title }}</a></h1>
|
||||
</header>
|
||||
{% if post.image %}<span class="image main"><img src="{{ site.baseurl }}/{{ post.image }}" alt="" /></span>{% endif %}
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> {{ post.description }}</h3>
|
||||
<hr>
|
||||
<!-- {% if post.image %}<span class="image main"><img src="{{ site.baseurl }}/{{ post.image }}" alt="" /></span>{% endif %}
|
||||
{% if post.date %}<p>{{ post.date }}</p>{% endif %}
|
||||
<p>{{ post.content }}</p>
|
||||
<p>{{ post.content }}</p> -->
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
18
_posts/2019-06-23-googlectf.md
Normal file
18
_posts/2019-06-23-googlectf.md
Normal file
@ -0,0 +1,18 @@
|
||||
---
|
||||
layout: post
|
||||
title: "I gave Google's CTF a short try and learned a thing or two"
|
||||
description: "But exams got in the way and took all the fun"
|
||||
date: 2019-06-23 22:04:00
|
||||
categories: ctf
|
||||
---
|
||||
|
||||
Honestly, I completely forgot that this was the weekend of Google's online [CTF Qualifications](https://g.co/ctf) for 2019 and was late, unprepared, busy, and did not have a team to work with.
|
||||
|
||||
## What is this event?
|
||||
Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.
|
||||
|
||||
## What I learned
|
||||
Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, `strings`. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. [Ghidra](https://www.nsa.gov/resources/everyone/ghidra/), an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.
|
||||
|
||||
## Will I do this again?
|
||||
Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.
|
@ -79,9 +79,36 @@
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>What I have learned from 2 years of FRC programming</h1>
|
||||
<h1><a href="/ctf/2019/06/23/googlectf.html" class="link">I gave Google's CTF a short try and learned a thing or two</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> But exams got in the way and took all the fun</h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-23 18:04:00 -0400</p>
|
||||
<p><p>Honestly, I completely forgot that this was the weekend of Google’s online <a href="https://g.co/ctf">CTF Qualifications</a> for 2019 and was late, unprepared, busy, and did not have a team to work with.</p>
|
||||
|
||||
<h2 id="what-is-this-event">What is this event?</h2>
|
||||
<p>Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.</p>
|
||||
|
||||
<h2 id="what-i-learned">What I learned</h2>
|
||||
<p>Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, <code class="highlighter-rouge">strings</code>. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. <a href="https://www.nsa.gov/resources/everyone/ghidra/">Ghidra</a>, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.</p>
|
||||
|
||||
<h2 id="will-i-do-this-again">Will I do this again?</h2>
|
||||
<p>Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1><a href="/frc/2019/06/21/Robot-Experiences.html" class="link">What I have learned from 2 years of FRC programming</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> Robots are pretty cool</h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-21 11:14:00 -0400</p>
|
||||
<p><p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p>
|
||||
|
||||
@ -136,14 +163,18 @@
|
||||
<li>Dedicate a day to robot driving lessons</li>
|
||||
<li>Use a custom library with wrappers and tools built by me to provide easy interfaces for new programmers</li>
|
||||
</ul>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>Blogs I Read</h1>
|
||||
<h1><a href="/random/2019/06/18/Blogs-I-Read.html" class="link">Blogs I Read</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> The constantly updating list</h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-18 09:18:00 -0400</p>
|
||||
<p><p>This is a copy-pastable list of rss feeds I subscribe to:</p>
|
||||
|
||||
@ -154,14 +185,18 @@ http://www.windytan.com/rss.xml
|
||||
http://psy-lob-saw.blogspot.com/rss.xml
|
||||
https://retrylife.ca/feed.xml
|
||||
</code></pre></div></div>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>I made a new song!</h1>
|
||||
<h1><a href="/music/2019/06/17/AMM2M1-release.html" class="link">I made a new song!</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> Releasing a new song with friends at school</h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-17 06:20:00 -0400</p>
|
||||
<p><p>I am currently taking a class in school called <a href="https://www.facebook.com/studio225beal/">Music and computers (AMM2M)</a>, where as part of the class, whe get together into bands, and produce a song. After taking a break from music production for over a year, we have released our song for the class (we do two songs, but the second is not finished yet).</p>
|
||||
|
||||
@ -175,14 +210,18 @@ https://retrylife.ca/feed.xml
|
||||
<source src="/assets/audio/SpamPhoneCalls.mp3" type="audio/mpeg" />
|
||||
Your browser does not support audio players
|
||||
</audio>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>Graphing the relation between wheels and awards for FRC</h1>
|
||||
<h1><a href="/frc/2019/06/16/Graphing-w2a.html" class="link">Graphing the relation between wheels and awards for FRC</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> AKA. Why programmer + reddit + matplotlib is a bad idea.</h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-16 11:51:00 -0400</p>
|
||||
<p><p>I was scrolling through reddit the other day, and came across <a href="https://www.reddit.com/r/FRC/comments/byzv5q/i_know_what_im_doing/">this great post</a> by u/<a href="https://www.reddit.com/user/MasterQuacks/">MasterQuacks</a>.</p>
|
||||
|
||||
@ -237,14 +276,18 @@ Your browser does not support audio players
|
||||
<p>Here is the resulting image. From left, to right: 5024, 254, 2224, 5406, 2056</p>
|
||||
|
||||
<p><img src="/assets/images/w2a.png" alt="Thr result" /></p>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>GitHub's CSS is boring. So I refreshed the design</h1>
|
||||
<h1><a href="/css/2019/06/12/Styiling-GitHub.html" class="link">GitHub's CSS is boring. So I refreshed the design</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> </h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-06-12 09:09:00 -0400</p>
|
||||
<p><p>I have been using GitHub since 2017, and have been getting tired of GitHub’s theme. I didn’t need a huge change, just a small refresh. So, to solve this, I whipped out <a href="https://addons.mozilla.org/en-CA/firefox/addon/styl-us/">Stylus</a> and made a nice little CSS file for it.</p>
|
||||
|
||||
@ -285,14 +328,18 @@ Your browser does not support audio players
|
||||
|
||||
<h2 id="use-it-yourself">Use it yourself</h2>
|
||||
<p>I put this theme on userstyles.org. You can download and install it by going to <a href="https://userstyles.org/styles/172679/ewpratten-s-githubtheme">my userstyles page</a>.</p>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>Building a safe and easy system for sending computer vision data from a raspberry pi to a roborio</h1>
|
||||
<h1><a href="/frc/2019/05/27/Building-Safe-Vision-Comms.html" class="link">Building a safe and easy system for sending computer vision data from a raspberry pi to a roborio</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> </h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-05-27 05:22:00 -0400</p>
|
||||
<p><p>Computer vision on an FRC robot has some problems.</p>
|
||||
<ul>
|
||||
@ -322,14 +369,18 @@ Your browser does not support audio players
|
||||
</ul>
|
||||
|
||||
<p>I am currently working on a protocol for solving this problem, nad will post an update here once it has been tested. Feel free to let me know your thoughts and ideas.</p>
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>The language hunt</h1>
|
||||
<h1><a href="/frc/2019/04/30/FRC-Languages.html" class="link">The language hunt</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> </h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2019-04-30 14:32:00 -0400</p>
|
||||
<p><p>Our programming team is looking to switch languages in the 2020 season. Here is the what, why, and how.</p>
|
||||
|
||||
@ -346,14 +397,18 @@ Your browser does not support audio players
|
||||
<h2 id="part-2">Part 2</h2>
|
||||
<p>We are currently doing our evaluation of new programming languages, and an update will be posted to this blog in the near future.</p>
|
||||
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
|
||||
<header class="major">
|
||||
<h1>Using a python script to create devRant posts based on the style and content of another user</h1>
|
||||
<h1><a href="/devrant/2018/06/27/BecomeRanter.html" class="link">Using a python script to create devRant posts based on the style and content of another user</a></h1>
|
||||
</header>
|
||||
|
||||
<!-- Cheaty way to display a description -->
|
||||
<h3> </h3>
|
||||
<hr>
|
||||
<!--
|
||||
<p>2018-06-27 14:32:00 -0400</p>
|
||||
<p><p>Ok… The title is slightly wrong. There are actually 2 scripts.. Sorry about that.</p>
|
||||
|
||||
@ -406,7 +461,7 @@ pip3 install tensorflow-gpu #for gpu processing
|
||||
|
||||
<p>A new hdf5 file will be generated in the same folder as the script</p>
|
||||
|
||||
</p>
|
||||
</p> -->
|
||||
|
||||
|
||||
</div>
|
||||
|
147
_site/ctf/2019/06/23/googlectf.html
Normal file
147
_site/ctf/2019/06/23/googlectf.html
Normal file
@ -0,0 +1,147 @@
|
||||
<!DOCTYPE html>
|
||||
<!--
|
||||
Forty by HTML5 UP
|
||||
html5up.net | @ajlkn
|
||||
Free for personal and commercial use under the CCA 3.0 license (html5up.net/license)
|
||||
-->
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<title>Evan Pratten</title>
|
||||
<meta charset="utf-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
|
||||
<!--[if lte IE 8]><script src="/assets/js/ie/html5shiv.js"></script><![endif]-->
|
||||
<link rel="stylesheet" href="/assets/css/main.css" />
|
||||
<!--[if lte IE 9]><link rel="stylesheet" href="/assets/css/ie9.css" /><![endif]-->
|
||||
<!--[if lte IE 8]><link rel="stylesheet" href="/assets/css/ie8.css" /><![endif]-->
|
||||
</head>
|
||||
|
||||
<body>
|
||||
|
||||
<!-- Wrapper -->
|
||||
<div id="wrapper">
|
||||
|
||||
<!-- Header -->
|
||||
<header id="header" >
|
||||
<a href="http://localhost:4000//" class="logo"><strong>Evan Pratten</strong> <span>retrylife</span></a>
|
||||
<nav>
|
||||
<!-- <a href="#menu">Menu</a> -->
|
||||
</nav>
|
||||
</header>
|
||||
|
||||
<!-- Menu -->
|
||||
<!-- <nav id="menu">
|
||||
<ul class="links">
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<li><a href="http://localhost:4000//">Home</a></li>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
<li><a href="http://localhost:4000/all_posts.html">All posts</a></li>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
</ul>
|
||||
<ul class="actions vertical">
|
||||
<li><a href="#" class="button special fit">Get Started</a></li>
|
||||
<li><a href="#" class="button fit">Log In</a></li>
|
||||
</ul>
|
||||
</nav> -->
|
||||
|
||||
|
||||
<!-- Main -->
|
||||
<div id="main" class="alt">
|
||||
|
||||
<!-- One -->
|
||||
<section id="one">
|
||||
<div class="inner">
|
||||
<header class="major">
|
||||
<h1>I gave Google's CTF a short try and learned a thing or two</h1>
|
||||
</header>
|
||||
|
||||
<p><p>Honestly, I completely forgot that this was the weekend of Google’s online <a href="https://g.co/ctf">CTF Qualifications</a> for 2019 and was late, unprepared, busy, and did not have a team to work with.</p>
|
||||
|
||||
<h2 id="what-is-this-event">What is this event?</h2>
|
||||
<p>Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.</p>
|
||||
|
||||
<h2 id="what-i-learned">What I learned</h2>
|
||||
<p>Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, <code class="highlighter-rouge">strings</code>. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. <a href="https://www.nsa.gov/resources/everyone/ghidra/">Ghidra</a>, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.</p>
|
||||
|
||||
<h2 id="will-i-do-this-again">Will I do this again?</h2>
|
||||
<p>Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.</p>
|
||||
</p>
|
||||
</div>
|
||||
</section>
|
||||
|
||||
</div>
|
||||
|
||||
<!-- Footer -->
|
||||
<footer id="footer">
|
||||
<div class="inner">
|
||||
<ul class="icons">
|
||||
|
||||
<li><a href="https://twitter.com/ewpratten" class="icon alt fa-twitter" target="_blank"><span class="label">Twitter</span></a></li>
|
||||
|
||||
<li><a href="https://gitlab.com/u/ewpratten" class="icon alt fa-gitlab" target="_blank"><span class="label">GitLab</span></a></li>
|
||||
|
||||
<li><a href="https://github.com/ewpratten" class="icon alt fa-github" target="_blank"><span class="label">GitHub</span></a></li>
|
||||
|
||||
|
||||
<li><a href="/feed.xml" class="icon alt fa-rss" target="_blank"><span class="label">RSS</span></a></li>
|
||||
</ul>
|
||||
<ul class="copyright">
|
||||
<li>© Evan Pratten retrylife</li>
|
||||
<li>Design: <a href="https://html5up.net" target="_blank">HTML5 UP</a></li>
|
||||
|
||||
</ul>
|
||||
</div>
|
||||
</footer>
|
||||
|
||||
</div>
|
||||
|
||||
<!-- Scripts -->
|
||||
<script src="http://localhost:4000/assets/js/jquery.min.js"></script>
|
||||
<script src="http://localhost:4000/assets/js/jquery.scrolly.min.js"></script>
|
||||
<script src="http://localhost:4000/assets/js/jquery.scrollex.min.js"></script>
|
||||
<script src="http://localhost:4000/assets/js/skel.min.js"></script>
|
||||
<script src="http://localhost:4000/assets/js/util.js"></script>
|
||||
<!--[if lte IE 8]><script src="http://localhost:4000/assets/js/ie/respond.min.js"></script><![endif]-->
|
||||
<script src="http://localhost:4000/assets/js/main.js"></script>
|
||||
|
||||
<!-- Global site tag (gtag.js) - Google Analytics -->
|
||||
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-74118570-2"></script>
|
||||
<script>
|
||||
window.dataLayer = window.dataLayer || [];
|
||||
|
||||
function gtag() {
|
||||
dataLayer.push(arguments);
|
||||
}
|
||||
gtag('js', new Date());
|
||||
|
||||
gtag('config', 'UA-74118570-2');
|
||||
</script>
|
||||
|
||||
</body>
|
||||
|
||||
</html>
|
@ -1,4 +1,13 @@
|
||||
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.8.5">Jekyll</generator><link href="http://localhost:4000/feed.xml" rel="self" type="application/atom+xml" /><link href="http://localhost:4000/" rel="alternate" type="text/html" /><updated>2019-06-21T16:12:12-04:00</updated><id>http://localhost:4000/feed.xml</id><title type="html">Evan Pratten</title><subtitle>Computer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.</subtitle><entry><title type="html">What I have learned from 2 years of FRC programming</title><link href="http://localhost:4000/frc/2019/06/21/Robot-Experiences.html" rel="alternate" type="text/html" title="What I have learned from 2 years of FRC programming" /><published>2019-06-21T11:14:00-04:00</published><updated>2019-06-21T11:14:00-04:00</updated><id>http://localhost:4000/frc/2019/06/21/Robot-Experiences</id><content type="html" xml:base="http://localhost:4000/frc/2019/06/21/Robot-Experiences.html"><p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p>
|
||||
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.8.5">Jekyll</generator><link href="http://localhost:4000/feed.xml" rel="self" type="application/atom+xml" /><link href="http://localhost:4000/" rel="alternate" type="text/html" /><updated>2019-06-24T12:06:10-04:00</updated><id>http://localhost:4000/feed.xml</id><title type="html">Evan Pratten</title><subtitle>Computer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.</subtitle><entry><title type="html">I gave Google’s CTF a short try and learned a thing or two</title><link href="http://localhost:4000/ctf/2019/06/23/googlectf.html" rel="alternate" type="text/html" title="I gave Google's CTF a short try and learned a thing or two" /><published>2019-06-23T18:04:00-04:00</published><updated>2019-06-23T18:04:00-04:00</updated><id>http://localhost:4000/ctf/2019/06/23/googlectf</id><content type="html" xml:base="http://localhost:4000/ctf/2019/06/23/googlectf.html"><p>Honestly, I completely forgot that this was the weekend of Google’s online <a href="https://g.co/ctf">CTF Qualifications</a> for 2019 and was late, unprepared, busy, and did not have a team to work with.</p>
|
||||
|
||||
<h2 id="what-is-this-event">What is this event?</h2>
|
||||
<p>Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.</p>
|
||||
|
||||
<h2 id="what-i-learned">What I learned</h2>
|
||||
<p>Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, <code class="highlighter-rouge">strings</code>. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. <a href="https://www.nsa.gov/resources/everyone/ghidra/">Ghidra</a>, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.</p>
|
||||
|
||||
<h2 id="will-i-do-this-again">Will I do this again?</h2>
|
||||
<p>Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.</p></content><author><name></name></author><summary type="html">Honestly, I completely forgot that this was the weekend of Google’s online CTF Qualifications for 2019 and was late, unprepared, busy, and did not have a team to work with.</summary></entry><entry><title type="html">What I have learned from 2 years of FRC programming</title><link href="http://localhost:4000/frc/2019/06/21/Robot-Experiences.html" rel="alternate" type="text/html" title="What I have learned from 2 years of FRC programming" /><published>2019-06-21T11:14:00-04:00</published><updated>2019-06-21T11:14:00-04:00</updated><id>http://localhost:4000/frc/2019/06/21/Robot-Experiences</id><content type="html" xml:base="http://localhost:4000/frc/2019/06/21/Robot-Experiences.html"><p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p>
|
||||
|
||||
<h2 id="my-roles">My roles</h2>
|
||||
<p>In my first year, I joined the team as a programmer and had a fun time learning about embedded programming and development with hardware. Then, in my second year, I was promoted to programming co-lead along with <a href="https://github.com/slownie">@slownie</a>. I much preferred my second season because I had a better understanding of the technology I was working with, and we got to play with some cool tools throughout the season.</p>
|
||||
|
@ -120,6 +120,18 @@
|
||||
<section id="one" class="tiles">
|
||||
|
||||
|
||||
<article>
|
||||
<span class="image">
|
||||
<img src="" alt="" />
|
||||
</span>
|
||||
<header class="major">
|
||||
<h3><a href="/ctf/2019/06/23/googlectf.html" class="link">I gave Google's CTF a short try and learned a thing or two</a></h3>
|
||||
<p>But exams got in the way and took all the fun</p>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
|
||||
|
||||
<article>
|
||||
<span class="image">
|
||||
<img src="" alt="" />
|
||||
@ -180,18 +192,6 @@
|
||||
|
||||
|
||||
|
||||
<article>
|
||||
<span class="image">
|
||||
<img src="" alt="" />
|
||||
</span>
|
||||
<header class="major">
|
||||
<h3><a href="/frc/2019/05/27/Building-Safe-Vision-Comms.html" class="link">Building a safe and easy system for sending computer vision data from a raspberry pi to a roborio</a></h3>
|
||||
<p></p>
|
||||
</header>
|
||||
</article>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user