Don’t miss a second! Check out what [email protected] is up to.

Meeting :: iOS Security (2/10/2017)

About the Meeting This meeting we will explore iOS vulnerabilities and how they have been exploited by jailbreak tools as well as exploit mitigations implemented by Apple to combat these attacks. These exploits and mitigations will be covered from a high level while still detailing internal undocumented security features on iOS We will also be… Read more »

Meeting :: A Foray Into Forensics (2/3/2017)

About the Meeting Join us for our next meeting on 2/3 in ENG2-102 at 4:30pm for an interactive talk about Forensics. We’ll be delving through pcaps – so have your Wireshark or tshark ready if you want to follow along. Meeting Slides: Here

Meeting :: Down to Business (1/27/2017)

About the Meeting Join us in ENG2-102 at 4:30pm for a talk about how to speak business and an intro to Latek with Gaelan Adams. We’ll cover business euphemisms and how to get your company to do what you want. For tool-time this week we will be going from zero to hero with, arguably one… Read more »

Meeting :: First of the Year (1/20/2017)

About the Meeting Welcome back! Join us for our first meeting of the semester on 1/20 in ENG2-102 at 4:30pm for a refresher on how to CTF and demystifying regex. Meeting Slides:

Meeting :: Exploit Finale (12/2/2016)

About the Meeting For our signoff meeting, Ditmar Wendt will cover Metasploit – the basics, what it is, and how you can improve your proficiency with the Metasploit framework. Also, we will be covering Netcat and Socat for tool-time this week. Our first meeting of the spring semester is tentatively scheduled for January 20th, 2017…. Read more »

Meeting :: Texas Instruments (11/18/2016)

About the Meeting Jimi Mills from the Texas Instruments (T.I) Security Operations Center will be presenting an enterprise IT perspective on malware and infection paths with examples from a network security monitoring view including analysis and tools. This walkthrough will include examples of packet captures, implementation of tools such as Suricata IDS, and extracting and… Read more »

Meeting :: Build your own NSA (11/11/2016)

About the Meeting This week Gaelan Adams will be covering a talk titled “Building your own internal NSA”, the talk will cover SIEMs (Security Information Event Monitors), data acquisition, and the foundations for building your own system from scratch. Also we will be covering Powershell Empire, a powerful Post-Exploitation Framework made entirely with powershell, during… Read more »

Meeting :: Protiviti (11/4/2016)

About the Meeting This week [email protected] presents hosts Protiviti, a security consulting firm. They will be presenting “Today’s Industries, Tomorrow’s Trends, and Past (real) Examples”. Also we will be covering John the Ripper, an open-source password cracking tool, during tool-time this week. Make sure you catch us in ENG2-102. Meeting Slides:

Meeting :: Phreaking (10/28/2016)

About the Meeting Ever wonder how random websites know what things you last visited? Are you tired of hacking computers? Join us for a talk on Browser Fingerprinting, and Phone Phreaking. We will also be covering another unique tool during tooltime as well. Meeting Slides:

Meeting :: Bugcrowd (10/21/2016)

About the Meeting This Friday in HEC-125 we have a talk from Bugcrowd, a bug-bounty platform. This week for tool time we will be covering Autopsy, a open source digital forensics platform used by law enforcement, military, and corporate examiners to investigate what happened on a computer. Meeting Slides: Bugcrowd Slides: