Don’t miss a second! Check out what [email protected] is up to.

Meeting :: YARA and Post Exploitation (4/6/2018)

About the Meeting This week, Levi will be covering post exploitation. Learn about what to do after you get that first shell, and how to expand your access. For Tool Time, Michael will be going over YARA, a tool for identifying and classifying malware based on custom rules. After the meeting, Harris representatives will be… Read more »

Meeting :: Iodine with Social Engineering and osint (3/30/2018)

About the Meeting This week, Charlos and Levi will be covering the art of hacking people through Open Source Intelligence and Social Engineering. For Tool Time, Charlton will be going over iodine, a tool that lets you tunnel IPv4 data through a DNS server. Here are our meeting slides:

Meeting :: GDB, PEDA, Reverse Engineering & Exploitation (3/23/2018)

About the Meeting This week, Ryan will talk about how to solve Reverse Engineering and Binary Exploiting problems without crying and questioning why you ever entered this field in the first place (design was so much less stressful and difficult). For Tool Time, Peyton will be going over GDB: a powerful debugging tool that will… Read more »

Meeting :: Intro to CTFs and SELinux (3/9/2018)

About the Meeting Join us this week for an introduction to CTFs. We’ll be going over common types of CTF challenges and the tools used to solve them. For Tool Time, we’ll be going over SELinux, a security module that adds mandatory access control to Linux.

Meeting :: Darden and Social Engineering (3/2/2018)

About the Meeting This week we will have Ean Meyer, a Information Security Engineer from Darden, here to present “I’m calling from your helpdesk” – Gathering scammer info to create technical controls. During this demonstration you will find out how to leverage anonymized GoogleApps for Business, CanaryTokens, and Google Voice to call back scammers and… Read more »

Meeting :: Web App Security (2/23/2018)

About the Meeting This week, Bobby will be presenting on web app security. The presentation will cover an introduction to various web exploitation methods and techniques on both the application and service level. Covered topics include XSS, template injection, and CSS injection, among other modern vectors of compromise. For Tool Time, Jack will be going… Read more »

Meeting :: Practical Hardware Exploitation (2/16/2018)

About the Meeting Come learn how to play around with the Internet of Things in unintended ways with this week’s presentation, Practical Hardware Exploitation. Levi will be covering discovering and exploiting vulnerabilities common in embedded devices, ranging from name-brand “smart” light-bulbs to USB devices. For Tool Time, Shane will be going over Shodan, a search… Read more »

Meeting :: Secure Coding Revisited (2/9/2018)

About the Meeting Explore many unexpected security vulnerabilities that are common in C and C++ code in this week’s presentation, Secure Coding Revisited. Kevin will show a handful of problematic code patterns you (or your professors) may have written, why they are security flaws, and how to avoid them. For Tool Time, Nelson will be… Read more »

Meeting :: Homelab Help (2/2/2018)

About the Meeting Have you ever wondered what you can host on your home network other than a Minecraft server? If so, this week’s meeting is for you! This week, Peyton will be covering the basics of setting up your very own Homelab. For Tool Time, Jonah will be going over VMWare workstation and Oracle… Read more »

Meeting :: Mandiant – Evolving Attacks (1/26/2018)

About the Meeting This week we will have Pat McCoy, from Mandiant, here to present on “Evolving Attacks – Being Sneaky with CDNs”. This presentation will take you through recent trends observed during breach investigations, and provide background and specifics related to “Domain Fronting”, and how it can mask attacker or red team C2 infrastructure…. Read more »