Don’t miss a second! Check out what [email protected] is up to.

Meeting :: Elections (4/21/2017)

About the Meeting This week, we want you (to vote in elections)! No seriously, we need you to vote for the next round of elected officials to take over for the next year. Your next executive board will be responsible for content planning and club organization so vote wisely! Please note you must be a… Read more »

Meeting :: Anatomy of an Attack (4/14/2017)

About the Meeting The internet as we know it has become a scary place — with attacks abound, zero-day vulnerabilities in critical infrastructure, and progressively easier ways to hand over the keys to the kingdom to attacks. Join us this Friday to learn about the offensive capabilities of a number of recent cyber attacks, and… Read more »

Meeting :: Leveraging the Cloud (4/7/2017)

About the Meeting Join us this Friday to learn about using various cloud hosting providers such as Amazon AWS to host your own virtual private servers! We will demonstrate how to create cloud hosted virtual machines and add SSH keys for remote administration with SSH clients like PuTTY. See the slides here.

Meeting :: Social Engineering (3/31/2017)

About the Meeting Join us this week for a social engineering presentation by Heather Lawrence and Robert Tonic. We will be going in-depth on various social engineering topics covering elicitation, pretexting, mind tricks, neurolinguistic programming, and information gathering. Also, we will be covering the Social Engineering Toolkit (SET) for tool-time this week. See the slides… Read more »

Meeting :: Vector35 Talk (3/24/2017)

About the Meeting This week, Vector 35 will be here to demo Binary Ninja, their powerful (yet affordable) reverse engineering platform. They will be going over the PwnAdventure series of hackable video games, including the differences between them, the tools involved with solving the challenges, and how Vector 35 created them. See the slides here.

Meeting :: FireEye Tech Talk (3/10/2017)

About the Meeting FireEye will be presenting on the “Anatomy of an attack – It’s a ‘who’ not a ‘what’.” This presentation will take you through a typical Red Team Engagement and demonstrate why penetration testing may not provide an accurate representation of a sophisticated threat actor. See the slides here.

Meeting :: Exploit and Vuln Research (3/3/2017)

About the Meeting Are you interested in modern day exploitation and vulnerability research? Come see what it’s really like! After this presentation, you will never trust anything again. For tool-time this week we will be going over ngrok – a reverse proxy for local services used to connect applications. See the slides here.

Meeting :: Tamper Evident and NGC (2/24/2017)

About the Meeting If you’ve ever been curious about defeating tamper controls (e.g. VOID stickers, tape that leaves a residue, or wire tags) this week (2/24) we’re walking through how to defeat these tamper controls with a practice box of your own! We will split into small groups in order to have everyone try to… Read more »

Meeting :: Python Selenium (2/17/2017)

About the Meeting We will be learning how to use Python Selenium to interact with javascript elements on web pages in your web bots. We will take a website used for prank calling and automate it to call our fellow [email protected] members. Get the slides here