# 2023-2024 TJCSC Lectures
- [Introduction](/@tjcsc/intro-2324)
- [Discord Server](http://tjcsec.club/discord)
- [Practice Problems](http://ctf.tjcsec.club/)
- [Codespaces Desktop](http://tjcsec.club/desktop)
- [Shell Commands List](/@tjcsc/cmd)
## General Topics
### Welcome to CSC (9/13-9/15)
- [Welcome to CSC Presentation](https://docs.google.com/presentation/d/1Le4xLzEaeFSeLcR_j37aBKKP21SKTzWjmmlog0C75NU)
### Linux Intro (9/20-9/29)
- [Linux Intro](/@tjcsc/2023-09-20-linux-intro)
- [Shell Commands List](/@tjcsc/cmd)
## Web Exploitation
### Web Exploitation Intro (10/4-10/6)
- [Web Exploitation Intro](/@tjcsc/2023-10-04-web-intro)
### SQL Injection (11/15-11/17)
- [SQL Injection](https://hackmd.io/@_BMYPXL3QsunuO_0fmLI0Q/HyvygYfN6)
### Cross-Site Scripting (12/6-12/8)
- [XSS Presentation](https://docs.google.com/presentation/d/1X00ZXiPIlmFR5Vpj9PjXylPi-DIdbifFi1Py-ClTbBM/edit?usp=sharing)
- [XSS Notes](https://hackmd.io/@tjcsc/xss)
### Server-Side Template Injection (2/14)
- [SSTI](https://docs.google.com/presentation/d/1kDXp7-I17o_Y2AgcaB-mg6yNPCuWolVOago54T3nSJU/edit#slide=id.g2b8f1d67c2a_0_10)
## Forensics
### Forensics Intro (10/13)
- [Forensics Intro](https://docs.google.com/presentation/d/1tnklEwiumdYj29f9ajLs2HjCUGW9NTjtrROA8tOO5-0/edit?usp=sharing)
### Image Forensics (11/20)
- [Image Forensics](https://hackmd.io/@tjcsc/HJzZt4uNa)
### Compression Algorithms (5/9)
- [Compression Algorithms](https://docs.google.com/presentation/d/1ua6z0wi6aD-tWy0IWB_tBX_ezexob7MYoYAVg3Bb3eg/edit?usp=sharing)
## Cryptography
### Cryptography Intro (10/18-10/25)
- [Cryptography Intro](https://docs.google.com/presentation/d/1OuQ8Kn-_sN_25Xd4h4uD_xtVhykSMlIEfyYokHH3ElY/edit?usp=share_link)
### RSA (11/29-12/01)
- [RSA](/@tjcsc/rsa)
### Diffie Hellman (1/10-1/12)
- [Diffie Hellman](https://docs.google.com/presentation/d/1wotU3wjaL4Lf2ePPMqwECgieLBgCR6G7p_3itQXTjIc/edit?usp=sharing)
### Block Ciphers (3/6-3/8)
- [Block Ciphers](https://hackmd.io/J_0wp9TaSMeQfzCEgrjrcg)
### Hash Attacks (4/8)
- [Hash Attacks](https://hackmd.io/VrEiq4oLQuG5f6bORPxMxA)
### Advanced Block Cipher Attacks (4/29-5/1)
- [Advanced Block Cipher Attacks](https://hackmd.io/LWzwcU7xQKmzIQ5HM580tQ)
### Post-Quantum Cryptography (Ashwath Muppa) (5/7)
- [Post-Quantum Cryptography](https://docs.google.com/presentation/d/10Px9kXHwlLL2lHdFs48QCQ_Ipt4EfCd4T2CwLwE2cGw/edit?usp=sharing)
## Reversing
### Reversing Intro (10/27-11/1)
- [Reversing Intro](https://docs.google.com/presentation/d/1Z7DAmjtypNIZkrZv4v_T4PzaaAxOAcc84jNaqzXjC68/edit?usp=sharing)
- [Notes on Ghidra/GEF](https://hackmd.io/@_BMYPXL3QsunuO_0fmLI0Q/BJLO9j1ma)
- [Notes on z3](https://hackmd.io/@tjcsc/By52e7jYT)
- [Notes on angr](https://hackmd.io/@tjcsc/rJlU3zO9p)
### Low-Level Computing (2/7-2/9)
- [Low-Level Computing Notes](https://hackmd.io/@tjcsc/low-level-computing)
## PWN
### Buffer Overflow (2/21-2/23)
- [Buffer Overflow](https://docs.google.com/presentation/d/1Mdl8iY9PorCnBJtFl6TkIztMBJwz3UNktujC9zZI3C0/edit?usp=sharing)
### Return Oriented Programming (2/28 - 2/30)
- [ROP](https://hackmd.io/FB04d_fjRF6noiIk-F-lKg)
### Password Cracking (4/24 - 4/26)
- [Presentation](https://docs.google.com/presentation/d/1KPmXqBRMfg26qO_DkKRNncVV62XAUsjCiyj_YhhmrF4/edit?usp=sharing)
## Misc
### Jailbreaks (2/2)
- [Jailbreaks Presentation](https://docs.google.com/presentation/d/1_VrKs44DC9-MHiQ3D3C3jD2VAqJeUBFDK-inxYaezu8/edit?usp=sharing)
- [Jailbreaks Notes](https://hackmd.io/@tjcsc/jailbreaks)
### OSINT (1/31)
- [OSINT](https://docs.google.com/presentation/d/1zoZbCSTx8hQ-j2m7LlkhzQYE8eg8DqrHvJyktX3RObE/edit#slide=id.p)
### Guest Lecture by Zak Butler (11/10)
- [Guest Lecture](https://docs.google.com/presentation/d/1WIHMEh9E1JgBFHAT73rTAsN6b58MSuNipm6fDUXR2Sg/edit?usp=sharing)
{"description":"View the book with “<i class=\"fa fa-book fa-fw\"></i> Book Mode”.","title":"2023-2024 TJCSC Lectures","contributors":"[{\"id\":\"5d691418-116f-4624-a53f-b16eff6b0681\",\"add\":330,\"del\":0},{\"id\":\"8c9d2cdf-feac-4a91-b060-0110683be79d\",\"add\":522,\"del\":92},{\"id\":\"9dd58f19-54a8-4d24-bc6d-7d955ff53cff\",\"add\":2676,\"del\":788},{\"id\":\"fc13183d-72f7-42cb-a7b8-eff47e62c8d1\",\"add\":602,\"del\":26},{\"id\":\"ce2d5eeb-9fcf-4362-aefa-28948dd7c9c1\",\"add\":76,\"del\":23},{\"id\":\"9d30e989-8bbb-4176-a477-c62bd2f48efd\",\"add\":524,\"del\":37}]"}
2023-2024 TJCSC Lectures
General Topics Welcome to CSC (9/13-9/15)
Linux Intro (9/20-9/29)
Web Exploitation Web Exploitation Intro (10/4-10/6)
SQL Injection (11/15-11/17)
Cross-Site Scripting (12/6-12/8)
Server-Side Template Injection (2/14)
Forensics Forensics Intro (10/13)
Image Forensics (11/20)
Compression Algorithms (5/9)
Cryptography Cryptography Intro (10/18-10/25)
RSA (11/29-12/01)
Diffie Hellman (1/10-1/12)
Block Ciphers (3/6-3/8)
Hash Attacks (4/8)
Advanced Block Cipher Attacks (4/29-5/1)
Post-Quantum Cryptography (Ashwath Muppa) (5/7)
Reversing Reversing Intro (10/27-11/1)
Low-Level Computing (2/7-2/9)
PWN Buffer Overflow (2/21-2/23)
Return Oriented Programming (2/28 - 2/30)
Password Cracking (4/24 - 4/26)
Misc Jailbreaks (2/2)
OSINT (1/31)
Guest Lecture by Zak Butler (11/10)