Exploitation 3 (4/4/15)

Posted on by and filed under Workshops.

About the Meeting We are going to be looking at a new vulnerability class this week and also some other architectures. It is time to branch out from the x86 32-bit world.

Hardware VR (3/27/15)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck Cyber Quest Slides Workshop Needs About the Meeting We have a special guest again this week. Endgame‘s Andrew Righter is coming out to present on Hardware Vulnerability Research. We talk plenty about the software side; now it is time to dig a little deeper.

Exploitation/Networking (3/21/15)

Posted on by and filed under Workshops.

About the Workshop This week is going to be another nice week to review some of the exploitation and reversing exercises that we have covered. We are also going to introduce some basic networking tools that are incredibly useful to know. There is even a CTF happening so we will spend a little time on… Read more »

Pick All the Locks (3/20/15)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck Physical Security: From Locks to Dox Slide Deck (PDF) About the Meeting Lock picking. It is time to learn about all of the locks out in the world, and their various insecurities. Physical security is just as important to understand as computer security because with physical access to devices, one… Read more »

ElectroPlay (3/6/15)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck Magstripe “Security” Slide Deck About the Meeting This week, Alex Davis will present on the capabilities that cheap electronics—the ones you purchase from places like RadioShack and TigerDirect—give you. Mr. Davis likes to tinker with these sorts of electronics and has some fun to show.

Recap/PRNG (2/28/15)

Posted on by and filed under Workshops.

About the Workshop This week we are going to be spending half the time working on some recap problems in groups to make sure everyone is up to speed on what we have covered so far. We will spend the other half doing a light introduction to cryptography and networking. Resources Slides Exercises/Solutions PRNG Challenge

Internship Panel (2/27/15)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck About the Meeting Several of our members participated in internships over the summer with some pretty respectable companies in primarily information security roles. We have an awesome lineup of people who will share about their experiences, tell about how they landed these opportunities, and answer questions you might have about… Read more »

Exploitation Time! (2/21/15)

Posted on by and filed under Workshops.

About the Workshop We are going to cover some awesome material this week. Finally, it is time to start using some of our foundation knowledge to exploit. The first part will be a recap of what we have done with python and memory then we will build on the memory knowledge with some corruption, and… Read more »

Phishing The Planet (2/20/15)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck Phishing Slide Deck About the Meeting Are you familiar with the security term phishing? You will not hear a company talk about security without talking about phishing. It is incredibly important to know about. Mark is going to be teaching us a bit about it. He will demonstrating just how… Read more »