SIGPwny
  • About
  • Meetings
  • Publications
  • Sponsors
  • Join
Pwny CTF
    • Week 15: End of Year Social
    • Week 14: Gaming Hacking
    • Week 14: Kernel Pwn
    • Week 12: HackTheBox Walkthrough
    • Week 13: AI Hacking
    • Week 10: Phishing
    • b01lers CTF 2025
    • Week 12: Blockchain
    • Japan House Social
    • Week 09: GOAD: Installing Logging & Forensics Tools
    • UIUCTF 2025 Development
    • Tracer FIRE 2025
    • Sandia National Labs: Info, Careers, Q&A
    • eCTF 2025 All-Team
    • Double Jeopardy! DiceCTF 2025 + TAMUctf 2025
    • Week 09: Esoteric Languages
    • Week 09: Hands-On Intro to Metasploit
    • LAN Party
    • Week 06: Reverse Engineering AV for Evasion
    • Week 06: PWN IV: Heap Exploitation
    • eCTF 2025 All-Team
    • Digital Forensics I: SIFT
    • Week 06: Password Cracking
    • Week 05: Offensive Infrastructure & Secure C2
    • eCTF 2025 All-Team
    • Week 05: Security Careers
    • Week 05: Cryptography IV: Elliptic Curve Cryptography
    • eCTF 2025 All-Team (Design Week 6)
    • Week 04: PWN III: ROP
    • Week 04: HackTheBox 4v4s
    • SIGPwny x SIGPolicy: Cyberwarfare
    • eCTF 2025 All-Team (Design Week 5)
    • Week 04: Midwest CCDC Qualifiers (Active Roster Only)
    • Week 03: Windows Hardening Review
    • Week 03: Cryptography III: Block and Stream Ciphers
    • Week 03: Windows & Windows Privilege Escalation Review
    • Canceled: eCTF 2025 All-Team (Design Week 4)
    • LA CTF 2025
    • Week 02: Linux Hardening Review
    • Week 02: Java and Android Reverse Engineering
    • Week 02: Linux Privilege Escalation Review
    • FUZZWARE: Fuzzing Firmware
    • eCTF 2025 All-Team (Design Week 3)
    • Week 01: Web Hacking III: Server-Side Exploits
    • Week 01: Network Security Review
    • Week 00: Welcome Back!
    • eCTF 2025 All-Team (Design Week 2)
    • eCTF 2025 Design Meeting
    • eCTF 2025 Kickoff
    • eCTF Info Meeting
    • IrisCTF 2025
    • Week 14: Hot Chocolate Social
    • Week 14: Networking Security
    • Week 12: Offensive Development
    • eCTF Meeting
    • Week 12: Forensics
    • Week 10: Attacking Hardened Environments
    • Week 11: Ethics and Law
    • eCTF Info + Development
    • Week 10: Python Jails
    • Week 10: Active Directory III
    • Week 09: PWN II
    • Week 09: Snort: Installation & Configuration, Overview & Strategy
    • Week 09: Live Active Directory Attacks
    • Timing Side Channel Lab
    • Week 08: Cryptography II
    • Week 08: Secure DNS, E-Mail, FTP, SMB, DACL & AD + CyberForce Strategy
    • Week 08: Cryptography I
    • Week 08: Active Directory II
    • Week 07: PWN I
    • Week 07: System Administration Active Directory
    • Week 07: Physical Security and Lockpicking
    • Hivestorm 2024
    • Week 07: Active Directory I
    • Introduction to Side Channels
    • Week 06: Operational Security
    • Week 06: Hardening Default Windows Installations & Process Isolation
    • Week 06: Reverse Engineering II
    • Week 06: Windows & Windows Privilege Escalation
    • Week 05: x86-64 Assembly
    • BRICS+ CTF Qualifier
    • Week 05: Firewalls, Network Inspection, Traffic Monitoring, & Defense Strategy
    • Week 05: Reverse Engineering I
    • Week 05: Linux Privilege Escalation
    • Getting Started with Rust
    • BuckeyeCTF 2024
    • Week 04: Network Forensics and Wireshark
    • Week 04: OSINT I
    • Week 04: Web Hacking for Red Teams
    • Week 03: Network Security & Active Recon
    • Week 02: Web Hacking II
    • Week 02: Intro to Blue Teaming
    • Week 02: Web Hacking I
    • Intro to Embedded Systems
    • Week 02: Intro to Red Teaming
    • Week 01: Intro to Terminal and Setup
    • Bowling Social
    • Week 00: Introduction
    • Week 14: MPC (Multi-Party Computation)
    • Week 14: Supply Chain Attacks & Policy
    • Week 12: Location-Based OSINT
    • Week 12: Symbolic Execution
    • Week 10: Japan House Social
    • Week 10: AI Hacking
    • Week 09: Linux Kernel Exploitation
    • Week 09: Tracer FIRE
    • Week 09: Block and Stream Ciphers
    • Week 09: WiCyS Cryptography CTF
    • Week 07: Esoteric Languages
    • Week 06: Password Cracking
    • Week 05: Blockchain
    • Week 04: PWN IV - ROP
    • Week 03: PWN III - Heap Exploitation
    • Week 03: ARM Assembly
    • Week 02: Intro to Pentesting
    • Week 01: Editors
    • Week 00: Hot Cocoa + Board Games Social
    • Week 00: Welcome Back
    • Week 14: Cloud Security
    • Week 14: Web Hacking III
    • Week 12: Python Jails
    • Week 11: Antivirus and EDR Evasion
    • Week 10: Ethics and Law
    • Week 10: Forensics Workshop with CrowdStrike
    • Week 09: Workshop with Caesar Creek Software
    • Week 09: Physical Security and Lockpicking
    • Week 08: PWN II
    • Week 08: PWN I
    • Week 07: Crypto II
    • Week 07: Crypto I
    • Week 06: DRM Circumvention
    • Week 06: Reverse Engineering II
    • Week 05: x86-64 Assembly
    • Week 05: Double CTF! BuckeyeCTF 2023 + MapleCTF 2023
    • Week 05: OSINT I
    • Week 04: Reverse Engineering I
    • Week 03: Reverse Engineering Setup
    • Week 03: Web Hacking II
    • Week 02: Intro to Terminal and Setup (Session 2)
    • Week 02: PatriotCTF 2023
    • Week 02: Web Hacking I
    • Week 01: Intro to Terminal and Setup (Session 1)
    • Week 01: Bowling Social
    • Week 00: Introduction
    • Week 14: Reconnaissance + IoT Security with CypherCon
    • Week 14: Java Reverse Engineering
    • Week 13: UIUCTF 2023 Planning
    • Week 13: Crypto III: Block Ciphers
    • Week 12: Esoteric Languages
    • Week 11: UEFI Reverse Engineering
    • Week 11: Password Cracking
    • Week 09: AI Hacking II
    • Week 09: AI Hacking I
    • Week 06: Fuzzing
    • Week 06: Quantum Computing
    • Week 05: Nintendo DSi Browser Hacking
    • Week 05: Reverse Engineering III
    • Week 04: PWN IV: Heap
    • Week 04: Pentesting I
    • Week 03: PWN III: ROP
    • Week 02: Bypassing macOS Privacy Controls for Fun and Profit
    • Week 02: Web Hacking III
    • Week 01: Setup
    • Week 00: Welcome Back
    • Week 15: Introduction to Secure Computation
    • Week 14: SPR@I: "Machine Learning Threats"
    • Week 14: PWN II
    • Week 12: Forensics
    • Week 11: SPR@I: "Glyph Positions Break PDF Text Redaction"
    • Week 11: Python Jails
    • Week 10: SPR@I: "Preventing Large-Scale Cloud Attacks"
    • Week 10: Operational Security
    • Week 09: Physical Security and Lockpicking
    • Week 08: SPR@I: "All Eyes On Me"
    • Week 08: Reverse Engineering II
    • Week 07: Crypto II
    • Week 07: Crypto I
    • Week 06: Ethics and Law
    • Week 06: PWN I
    • Week 05: x86-64 Assembly
    • Week 05: OSINT I
    • Week 04: Reverse Engineering I
    • Week 03: Reverse Engineering + Pwn Setup
    • Week 03: Web Hacking II
    • Week 02: How to CTF (CSAW CTF Qualifications 2022)
    • Week 02: Web Hacking I
    • Week 01: Setup
    • Week 00: Introduction
    • Week 13: AI Security
    • Week 12: Crypto Math II: Lattice Attacks
    • Week 12: SPR@I: "Lord of the Rings" CPU Side-Channel
    • Week 11: RATs with ICCSP, Spray Paint Social
    • Week 11: Password Cracking
    • Week 10: Network and Security Research Group (NSRG)
    • Week 10: UIUC Technology Services Cybersecurity AMA
    • Week 09: UIUCTF 2022 Planning II
    • Week 09: Security Careers
    • Week 07: Social Event
    • Week 06: Intro to Pentesting
    • Week 05: Crypto Math I
    • Week 05: Windows Environments
    • Week 04: IoT Security (Paper Reading)
    • Week 04: Python Jails
    • Week 03: RSA Factoring
    • Week 02: Log4J
    • Week 02: Format Strings
    • Week 01: UIUCTF 2022 Planning I
    • Week 01: ROP (Return Oriented Programming)
    • Week 00: Fall Research Show and Tell
    • Week 00: Welcome Back
    • Week 14: Mobile Application Hacking
    • Week 14: Java Reverse Engineering
    • Week 12: Recursive Meeting
    • Week 11: Wireless Security
    • Week 11: Networking
    • Week 10: OSINT II
    • Week 10: OSINT I
    • Week 09: SIGPwny Spooky Summary
    • Week 09: Forensics
    • Week 08: The Big Rick
    • Week 08: Physical Security (Lockpicking)
    • Week 07: PWN II
    • Week 07: PWN I
    • Week 06: Reverse Engineering II
    • Week 06: Reverse Engineering I
    • Week 05: Law and Ethics
    • Week 05: Operational Security
    • Week 04: Crypto II
    • Week 04: Crypto I
    • Week 03: CSAW CTF Qualifications 2021 Recap
    • Week 03: Web Hacking II
    • Week 02: Web Hacking I
    • Week 01: Terminal
    • Week 01: Tutorial
    • Week 00: Setup
    • Week 00: Introduction
    • Week 12: How to Make CTF Challenges
    • Week 11: Docker
    • Week 10: HackIllinois... Literally! (Workshop)
    • Week 09: Recursive Meeting
    • Week 08: Pwny Racing
    • Week 07: Reverse Engineering Tools
    • Week 06: Basics of Cryptography
    • Week 05: Dynamic Linking and GOT/PLT
    • Week 04: Ethereum Security (Paper Reading)
    • Week 04: Sandbox/Jail Escapes
    • Week 03: Heap Exploitation II and III, Show and Tell
    • Week 02: Web Hacking: Path Traversal and SSRF
    • Week 00: Heap Exploitation I
    • Week 14: Web Hacking: XSS and SQL Injection
    • Week 12: Wireless Security
    • Week 09: Intro to OpSec
    • Week 08: Binary Exploitation Help Session
    • Week 07: Binary Exploitation
    • Week 06: Password Cracking and SQL Injection
    • Week 04: CLI Tools (R2, tmux, vim)
    • Week 03: Tutorial
    • Week 02: Introduction
    • Week 10: Java Reverse Engineering
    • Week 06: SQL Injection
    • Week 05: Lockpicking
    • Week 04: Bash
    • Week 03: Binary Exploitation (Part 2)
    • Week 02: Binary Exploitation (Part 1)
    • Week 01: Introduction (feat. Purdue) [LEGENDARY]
    • Week 14: DEF CON Talk Watch Party
    • Week 12: Discord Hacking
    • Week 11: CSAW CTF Finals 2019 Recap
    • Week 09: Intro to Forensics
    • Week 08: Recursive Meeting
    • Week 07: Intro to OpSec
    • Week 06: Intro to Crypto
    • Week 05: CLI Tools (R2, tmux, vim)
    • Week 04: Web Hacking
    • Week 03: Game Hacking
    • Week 02: Intro to Web (Natas)
    • Week 01: Introduction and Setup
    • Week 13: Discord Hacking
    • Week 11: Intro to OSINT
    • Week 10: Intro to RE + PWN with Northrop Grumman
    • Week 08: DynamoRIO
    • Week 07: Game Hacking
    • Week 06: Natas Web Hacking
    • Week 04: Linux Infrastructure
    • Week 03: UnderTheCTF
    • Week 14: Intro to Networking
    • Week 11: Intro to OpSec
    • Week 10: Format String Vulnerabilities
    • Week 09: Intro to Forensics
    • Week 08: Intro to Cryptography
    • Week 07: Intro to Web
    • Week 06: Intro to Reverse Engineering
    • Week 04: Intro to PWN
    • Week 03: Intro to Unix and CLI
    • Week 01: Introduction
    • Week 11: Modern Binary Exploitation
    • Week 10: TF2 LAN Party
    • Week 06: Intro to Reverse Engineering (Part 2)
    • Week 05: Lockpicking
    • Week 04: Intro to Reverse Engineering (Part 1)
    • Week 03: CSAW CTF Qualifications 2017 Recap
    • Week 02: Intro to CTF
    • Week 01: Introduction
    • Week 08: Reverse Engineering (Part 2)
    • Week 07: Reverse Engineering (Part 1)
    • Week 05: Intro to OpSec
    • Week 04: Intro to Crypto
    • Week 03: Number Bases (Binary, Hexadecimal, Base64)
    • Week 03: Intro to CTF (Part 2)
    • Week 02: Intro to CTF (Part 1)
    • Week 01: Introduction

Setup

FA2021 Week 00

welcome
setup
terminal
wsl
Thomas Quig
Sunday, August 29th, 2021
2 – 3 PM (CDT)
CIF 3025

Watch video

Download slides

Additional slide deck on terminal commands here.

Pictures

Panoramic shot of students setting up their environments


Sitemap

About

Meetings

Publications

Sponsors

Join

Connect

Discord

GitHub

Instagram

Twitter

YouTube

© 2025 SIGPwny. ACM@UIUC is a 501(c)(3) non-profit organization. Site source on GitHub.