About the Meeting This week we review topics that we discussed last semester and set the stage for the information we’ll cover this semester. T-shirts will be available for pickup at this meeting. Catch us next week (1/29) as one of alumni, Joe Pate from FireEye, covers Windows internals and host-based forensics. Slides: https://docs.google.com/presentation/d/17WFVZTR9P-ZTpxpaQPbgq3DO34Y_KmA7TvQSPR70Cb8/pub?start=false&loop=false&delayms=60000
About the Meeting Our last meeting of the semester will go out with a bang! Meet Shahid Buttar representing EFF as he discusses mass surveillance and protecting our privacy online in the Pegasus Ballroom. RSVP for this event here!
About the Meeting We’re in the last stretch before Thanksgiving break! This week Mike Felch, from Fortress Information Security, is going to educate us on our heritage from the hacker underground. He’ll cover the underground culture, philosophy, and important personalities that have made an impact on the scene. Bring your resumes if you’re interested in… Read more »
About the Meeting Kevin Colley will be giving a talk on secure coding. He’ll cover a high level overview of best security practices in C, such as avoiding insecure functions, defensive coding, and using tools to help find bugs so be sure to come learn why the way you were taught to write C code… Read more »
About the Meeting We are in the home stretch to the end of the semester, so don’t give up now! This week our Knightsec and Knightsec_SE teams are going to discuss their experiences at #CyberSEED held by the University of Connecticut. Included will be a discussion of the CTF challenges and social engineering tasks faced.
About the Meeting This week we welcome Craig Austin and Chris Porter from Protiviti. Their presentation “Penetration Testing in the Business World” is going to discuss different pentesting case studies and techniques so come with your questions and resumes!
About the Meeting This week join us as we discuss electronic authentication systems like RFIDs, NFC, CAC cards, and PIV cards. We will discuss how they work, different applications they are used in, and their vulnerabilities. If you’re not familiar with these systems, don’t worry, we got you covered. Resources Slides
About the Meeting This week join Alex Davis to learn how insecure common network setups are and how Windows leaks all your information. He will cover arp poisoning, what an attacker can gain, and cover more advanced attacks that exploit some of the security vulnerabilities in Windows, NetBIOS, and SMB. Ultimately, by the end of… Read more »
About the Meeting This week we welcome Jonathan Singer, one of the original founders of the club, and Jeff Toth, a local BSIDES coordinator, who are presenting a primer on the Metasploit Framework. They’ll review and demonstrate a number of the modules available in Metasploit. Join us in praying to the live demo gods! Resources… Read more »