Advent of Code Day 7

Advent of Code 2020 Map

As the holidays come to an end, I have completed (well not finished, but been working on while I had free time) Advent of Code. I’ve talked about this in years past, but the short of it is 25 days of coding problems. Day 7 has to do with playing a game of Camel Cards.

Advent of Code – Day 1

Advent of Code

Well I’m only 13 days late, but better late than never. I had some time to kill tonight and decided to finally jump on this year’s advent of code. Each day consists of 2 problems that you solve. So here goes Day 1…..Spoilers Inside

Advent of Code

Advent of Code

If you are looking for a fun way to work on your coding skills over the next 25 days or so I would encourage you to check out advent of code. This is a project run by Eric Wastle.

Army Cyber Skills Challenge 6

SGT Haubrich Award

Last week was the 6th annual Army Cyber Skills Challenge (ACSC) hosted by my home unit, 780th MI Brigade.  If you don’t recall, I first wrote about ACSC about this time last year.  This was the 2nd year in a row that I served as the OIC for the event, and it was truly bigger »

Boss of the SOC


Back in November I had the chance to attend the Splunk .conf conference here in DC.  One of the big after hours events of the conference is the Boss of the SOC (BOTS) competition that puts teams against each other to try and analyze a set of data to identify a variety of indicators of compromise from an incident. After a little bit of talking, Splunk decided to release the BOTS app as an open-source project.


TACLANE Encrypted Tunnel

Here is another CTF problem from last years Army Cyber Stakes Challenge.  You are provided a solid line of characters (see below) and have to turn it into the flag.  The trick is that because there aren’t any line breaks, you have to figure it out.


SNMP Packets

Another problem from ACSC5. You’ve been able to get on a router and capture some traffic in an effort to map out the the corporate network. Your intelligence team has told you that your target device has an IP address of but no one knows that actual location of it. Examine the network traffic and see if you can figure out the location of that device.