Check out our meeting topics and be on the lookout for meeting resources.

Hacking Exposed (9/26/14)

About the Meeting This week, our main topic is learning how to destroy things with Metasploit! We hope you signed your ethics statements, because now we’re going to teach you why having Kali Linux on hand could prove useful in a security engagement. We’ll take a dive into the chaining of tiny components to form… Read more »

CSAW CTF Preview (9/19/14)

About the Meeting This Friday’s meeting will be all about CSAW 2014, challenges from past CSAWs, and the tools you might need to play in it! We’ll also go over a little bit about the Women in STEM panel below and our current events – such as installing Doom on a Canon printer and a… Read more »

Protiviti Shares Security (9/12/14)

Post-Meeting Resources Slide Deck About the Meeting Welcome to the fourth week of school, you student hackers you. Bring your resume this Friday! We’re proud to announce the return of Protivi, a global security consulting firm, to presentations at [email protected]! For the bulk of our meeting, a few people from Protiviti will be talking about… Read more »

The Internet + Security (9/5/14)

Post-Meeting Resources Slide Deck About the Meeting Join us this Friday for our main event: student member Alex Lynch giving an overview of how you use the internet, exactly, and where security plays into the big jumble of computer equipment that we call the internet. In our review of current events, we’ll be reviewing what… Read more »

Client-side Program Decompilation by Willa Riggins (4/11/14)

We have yet another awesome guest speaker this Friday! She will cover topics including client-side program decompilation. Willa Riggins works with Lockheed Martin, spoke at Security B-Sides Orlando this last weekend, and used to run DC407. There will be lots of awesome demos and discussions. Make sure you come out to the meeting at 4:30… Read more »

ARP Spoofing & Recon (3/21/14)

This week our Vice President, Alex Davis, will be giving a presentation on ARP spoofing. Giovanni Torres will also be going over basic reconnaissance¬†and OPSEC. Learn how attackers gather information on targets and basic techniques on preventing them. We will be announcing new officer positions that will be available for the 2014-2015 school year. If… Read more »

Jonathan Adkins Visits (3/14/14)

Jonathan Adkins, M.S. of Digital Forensics graduate from UCF, will be giving a talk on network forensics, demonstrations of Remote Access Trojans, using proxy chains and XHydra to perform a dictionary attack, and using the Social Engineering Toolkit + Burp Suite to examine interactions with a cloned website. We’re covering a lot of attacks quickly,… Read more »

Real-Life Security (2/12/14)

This Friday our own Mark Ignacio will be going over a recent attack that happened on a server that he owns. He will be covering the forensic steps he did to discover the PHP shell on his server, as well as reversing the PHP shell to find out how it works. If you haven’t heard,… Read more »