Network Testing (4/22/16)

Posted on by and filed under Meetings.

About the Meeting This week, we’ll be using all sorts of things from Kali Linux to pentest a network, so having an updated Kali VM might be handy if you want to follow along and do some exploitation yourself!

Locks and Votes (4/15/2016)

Posted on by and filed under Meetings.

About the Meeting This week, don’t miss Jericho covering lock picking and making shims. We’re going to bring locks to practice on during the meeting so be sure to come out to increase your lock picking skills. Lastly, [email protected] has been invited to join the Electronic Frontier Alliance (EFA) which is a grassroots network formed… Read more »

Mega Meeting (4/8/16)

Posted on by and filed under Meetings.

About the Meeting This week we team up with TechKnights to present an evening of auditing code. We’re teaching some of the pitfalls of writing code showing examples of epic security failures using code the presenters have personally written. We’ll try to cover the whole gauntlet of both low hanging fruit and less obvious facepalms.

Fuzzing and Forensics (4/1/16)

Posted on by and filed under Meetings.

About the Meeting This Friday come prepared for back-to-back talks in Fuzzing and Memory Forensics presented by our VP, Shane, and Carrie Chenicek. What’s fuzzing? Throwing stuff at a wall (or binary) and seeing what sticks. Come learn the history of fuzzing, types of fuzzers and fuzzer frameworks, and how you can use fuzzing as… Read more »

Web Application Testing (3/4/16)

Posted on by and filed under Meetings.

About the Meeting We know you’re antsy to begin your spring break, but don’t miss out on a day in the life of a web application penetration tester! Willa Riggins from Veracode will go over the tools she uses on a daily basis and what she uses them for. This is a great opportunity to… Read more »

Deep vs. Dark (2/26/16)

Posted on by and filed under Meetings.

About the Meeting This week prepare for a deep dive into the hidden world of the deep web and dark web (turns out there’s a difference!). With a presentation on the darkest parts of the internet and the ways by which anonymity fails, we hope you’ll have quite the adventure in onionland

Social Engineering: Part Two (2/19/16)

Posted on by and filed under Meetings.

About the Meeting Join us this week for part II of the social engineering talk covering the finer points of information gathering, tools for your toolkit, and a walkthrough providing tips on reconnaissance strategy.

Social Engineering: Part One (2/12/16)

Posted on by and filed under Meetings.

About the Meeting This week will be a social engineering presentation by Heather Lawrence. This will start a two part series on social engineering covering elicitation, pretexting, mind tricks, and neurolinguistic programming. Next week we’ll cover part two with recon and information gathering. Slides: https://docs.google.com/presentation/d/1veLMEbRlTuxmVzGzJSw_oo_457UuEsJbLpcilylAx_o/pub?start=false&loop=false&delayms=30000 Main presentation (Heather’s slides): https://drive.google.com/file/d/0B0N05FlOnPXWWHl0eWJYQ25MQnM/view?usp=sharing

All Fun and Games (2/5/16)

Posted on by and filed under Meetings.

About the Meeting This week Ditmar Wendt will be covering the approach he takes to analyzing and writing hacks for Counter-Strike: Global Offensive. This slide deck also includes some advice for dealing with identity theft. Next week (2/12) Heather Lawrence will start a two part series on social engineering covering information gathering, elicitation, pretexting, mind… Read more »