Check out our meeting topics and be on the lookout for meeting resources.

Locks and Votes (4/15/2016)

About the Meeting This week, don’t miss Jericho covering lock picking and making shims. We’re going to bring locks to practice on during the meeting so be sure to come out to increase your lock picking skills. Lastly, [email protected] has been invited to join the Electronic Frontier Alliance (EFA) which is a grassroots network formed… Read more »

Mega Meeting (4/8/16)

About the Meeting This week we team up with TechKnights to present an evening of auditing code. We’re teaching some of the pitfalls of writing code showing examples of epic security failures using code the presenters have personally written. We’ll try to cover the whole gauntlet of both low hanging fruit and less obvious facepalms.

Fuzzing and Forensics (4/1/16)

About the Meeting This Friday come prepared for back-to-back talks in Fuzzing and Memory Forensics presented by our VP, Shane, and Carrie Chenicek. What’s fuzzing? Throwing stuff at a wall (or binary) and seeing what sticks. Come learn the history of fuzzing, types of fuzzers and fuzzer frameworks, and how you can use fuzzing as… Read more »

SunshineCTF Review (3/21/16)

About the Meeting This week join us as we cover the binary exploitation and harder forensics challenges presented in #SunshineCTF.

Web Application Testing (3/4/16)

About the Meeting We know you’re antsy to begin your spring break, but don’t miss out on a day in the life of a web application penetration tester! Willa Riggins from Veracode will go over the tools she uses on a daily basis and what she uses them for. This is a great opportunity to… Read more »

Deep vs. Dark (2/26/16)

About the Meeting This week prepare for a deep dive into the hidden world of the deep web and dark web (turns out there’s a difference!). With a presentation on the darkest parts of the internet and the ways by which anonymity fails, we hope you’ll have quite the adventure in onionland

Social Engineering: Part Two (2/19/16)

About the Meeting Join us this week for part II of the social engineering talk covering the finer points of information gathering, tools for your toolkit, and a walkthrough providing tips on reconnaissance strategy.

Social Engineering: Part One (2/12/16)

About the Meeting This week will be a social engineering presentation by Heather Lawrence. This will start a two part series on social engineering covering elicitation, pretexting, mind tricks, and neurolinguistic programming. Next week we’ll cover part two with recon and information gathering. Slides: https://docs.google.com/presentation/d/1veLMEbRlTuxmVzGzJSw_oo_457UuEsJbLpcilylAx_o/pub?start=false&loop=false&delayms=30000 Main presentation (Heather’s slides): https://drive.google.com/file/d/0B0N05FlOnPXWWHl0eWJYQ25MQnM/view?usp=sharing

All Fun and Games (2/5/16)

About the Meeting This week Ditmar Wendt will be covering the approach he takes to analyzing and writing hacks for Counter-Strike: Global Offensive. This slide deck also includes some advice for dealing with identity theft. Next week (2/12) Heather Lawrence will start a two part series on social engineering covering information gathering, elicitation, pretexting, mind… Read more »

FireEye (1/29/16)

About the Meeting Don’t miss this week’s presentation on Windows Forensics led by our very own Joe Pate from FireEye! There will be a deep dive into the process and techniques as well as a walkthrough of an investigation. Slides (FireEye slides not released for publication): https://docs.google.com/presentation/d/1il-vRpN526fLrV8TuVDHKDUcivXFOfrgyhQRoGN-QuY/pub?start=false&loop=false&delayms=30000