About the Meeting This week, we’ll be using all sorts of things from Kali Linux to pentest a network, so having an updated Kali VM might be handy if you want to follow along and do some exploitation yourself!
About the Meeting This week, don’t miss Jericho covering lock picking and making shims. We’re going to bring locks to practice on during the meeting so be sure to come out to increase your lock picking skills. Lastly, [email protected] has been invited to join the Electronic Frontier Alliance (EFA) which is a grassroots network formed… Read more »
About the Meeting This week we team up with TechKnights to present an evening of auditing code. We’re teaching some of the pitfalls of writing code showing examples of epic security failures using code the presenters have personally written. We’ll try to cover the whole gauntlet of both low hanging fruit and less obvious facepalms.
About the Meeting This Friday come prepared for back-to-back talks in Fuzzing and Memory Forensics presented by our VP, Shane, and Carrie Chenicek. What’s fuzzing? Throwing stuff at a wall (or binary) and seeing what sticks. Come learn the history of fuzzing, types of fuzzers and fuzzer frameworks, and how you can use fuzzing as… Read more »
About the Meeting This week join us as we cover the binary exploitation and harder forensics challenges presented in #SunshineCTF.
About the Meeting We know you’re antsy to begin your spring break, but don’t miss out on a day in the life of a web application penetration tester! Willa Riggins from Veracode will go over the tools she uses on a daily basis and what she uses them for. This is a great opportunity to… Read more »
About the Meeting This week prepare for a deep dive into the hidden world of the deep web and dark web (turns out there’s a difference!). With a presentation on the darkest parts of the internet and the ways by which anonymity fails, we hope you’ll have quite the adventure in onionland
About the Meeting Join us this week for part II of the social engineering talk covering the finer points of information gathering, tools for your toolkit, and a walkthrough providing tips on reconnaissance strategy.
About the Meeting This week will be a social engineering presentation by Heather Lawrence. This will start a two part series on social engineering covering elicitation, pretexting, mind tricks, and neurolinguistic programming. Next week we’ll cover part two with recon and information gathering. Slides: https://docs.google.com/presentation/d/1veLMEbRlTuxmVzGzJSw_oo_457UuEsJbLpcilylAx_o/pub?start=false&loop=false&delayms=30000 Main presentation (Heather’s slides): https://drive.google.com/file/d/0B0N05FlOnPXWWHl0eWJYQ25MQnM/view?usp=sharing
About the Meeting This week Ditmar Wendt will be covering the approach he takes to analyzing and writing hacks for Counter-Strike: Global Offensive. This slide deck also includes some advice for dealing with identity theft. Next week (2/12) Heather Lawrence will start a two part series on social engineering covering information gathering, elicitation, pretexting, mind… Read more »