Cicada 3301 (10/31/14)

Posted on by and filed under Meetings.

Post-Meeting Resources Meeting Slide Deck Cicada 3301 Slide Deck About the Meeting This Friday is Halloween! And in the spirit of spooky uneasiness, we’ve got some advanced stenography in the form of the hunt for the clues left around the internet and around real life by the enigmatic Cicada 3301. Heather Lawrence is going to… Read more »

Video Game Hacking 2 (10/24/14)

Posted on by and filed under Meetings.

About the Meeting We have got some more game hacking going on! Alex Lynch, who you might recognize from earlier in the semester, will be presenting on the much neglected other things that a lot of video games have: websites, in-game shopping carts, and more! Tool Time this week will include two extremely powerful tools… Read more »

Video Game Hacking (10/17/14)

Posted on by and filed under Meetings.

About the Meeting Join us this Friday as Knightsec captain Ditmar Wendt goes over hacking video games and an overview of all it entails – DLL injection, entity tables, aimbots, calculus, video overlays, and more! This week will be (surprisingly) digestable for computer laymen, so all skill levels are welcome! In current events we’ll try… Read more »

Address Resolution Protocol (10/10/14)

Posted on by and filed under Meetings.

About the Meeting Join us this Friday for a talk on abuse of Address Resolution Protocol (ARP)—or in layman’s terms, the bad things that can happen when an attacker and a victim computer are both behind the same router! Specifically, we’ll be talking about and demonstrating ARP poisoning, which is telling a computer on the… Read more »

Inject, Inject (10/3/14)

Posted on by and filed under Meetings.

About the Meeting One of our very own members, Kevin Brown, will be leading a talk on the Number One need to know from OWASP Top Ten, Injection! That’s right folks, we are going to see the oh so notorious SQL Injection during this meeting. “How does it work?” “How can we prevent it?” Your… Read more »

Hacking Exposed (9/26/14)

Posted on by and filed under Meetings.

About the Meeting This week, our main topic is learning how to destroy things with Metasploit! We hope you signed your ethics statements, because now we’re going to teach you why having Kali Linux on hand could prove useful in a security engagement. We’ll take a dive into the chaining of tiny components to form… Read more »

CSAW 2014 :: Recon 100 :: Kevin Chung

Posted on by and filed under CSAW 2014.

For this challenge we must “Find a picture of me that’s from before I was a high school student.” We start by looking through his photos on Facebook and LinkedIn but came up empty. We turned to Google to find out more. We found his website, twitter, and github but they didn’t provide any useful… Read more »

CSAW CTF Preview (9/19/14)

Posted on by and filed under Meetings.

About the Meeting This Friday’s meeting will be all about CSAW 2014, challenges from past CSAWs, and the tools you might need to play in it! We’ll also go over a little bit about the Women in STEM panel below and our current events – such as installing Doom on a Canon printer and a… Read more »

Protiviti Shares Security (9/12/14)

Posted on by and filed under Meetings.

Post-Meeting Resources Slide Deck About the Meeting Welcome to the fourth week of school, you student hackers you. Bring your resume this Friday! We’re proud to announce the return of Protivi, a global security consulting firm, to presentations at [email protected]! For the bulk of our meeting, a few people from Protiviti will be talking about… Read more »

The Internet + Security (9/5/14)

Posted on by and filed under Meetings.

Post-Meeting Resources Slide Deck About the Meeting Join us this Friday for our main event: student member Alex Lynch giving an overview of how you use the internet, exactly, and where security plays into the big jumble of computer equipment that we call the internet. In our review of current events, we’ll be reviewing what… Read more »