Huge shoutout to Raython and the Department of Homeland Security for making the phenomenal competition in San Antonio, Texas possible this past weekend! Congratulations to all who made it to all who participated! Below you can find an assortment of articles from around the web regarding the team’s victory at nationals: Congratulations to University of Central Florida… Read more »
We have yet another awesome guest speaker this Friday! She will cover topics including client-side program decompilation. Willa Riggins works with Lockheed Martin, spoke at Security B-Sides Orlando this last weekend, and used to run DC407. There will be lots of awesome demos and discussions. Make sure you come out to the meeting at 4:30… Read more »
This week our Vice President, Alex Davis, will be giving a presentation on ARP spoofing. Giovanni Torres will also be going over basic reconnaissance and OPSEC. Learn how attackers gather information on targets and basic techniques on preventing them. We will be announcing new officer positions that will be available for the 2014-2015 school year. If… Read more »
Get ready for pCTF 2014! Starts on 2014-04-11 (Fri) 5PM EDT (48 Hours) In: HEC 101 RSVP Here
Jonathan Adkins, M.S. of Digital Forensics graduate from UCF, will be giving a talk on network forensics, demonstrations of Remote Access Trojans, using proxy chains and XHydra to perform a dictionary attack, and using the Social Engineering Toolkit + Burp Suite to examine interactions with a cloned website. We’re covering a lot of attacks quickly,… Read more »
In this installment of Hack All The Things we will be discussing how to leverage DNS requests to exfiltrate data from a server. Note that while this is on on a Linux “victim” the same can be done in Windows using VBScript, Powershell, and even the fairly limited cmd.exe command prompt.
This installment of Hack All The Things will cover the importance of BASH scripting, give resources for learning BASH scripting, and show examples of using BASH scripts to automate certain tasks.
Why hack only some of the things when you could hack them all? While many security hobbyists and professionals are often quite adept at a certain niche in security, having some cross-training in other areas is not only beneficial to your individual growth but is useful in a corporate situation where you may be asked… Read more »