Check out our meeting topics and be on the lookout for meeting resources.
About the Meeting This week we’re discussing web application exploitation and going over some of last week’s CSAW challenges. We’ll cover measures to protect yourself when using webapps online (password manager, SSL, non-CC purchasing, etc). Resources Slides PowerPoint
About the Meeting In preparation for a weekend of CTF’ing this meeting we will discuss recon, forensics, reverse engineering, and exploitation challenges from previous years. After the meeting and throughout the weekend, join us in HEC 101 as we try to solve the CSAW qualification round challenges or hit us up on IRC to participate… Read more »
About the Meeting This meeting features a panel of students and alumni sharing their experiences obtaining information security internships or positions. We’ll cover resume tips, showcase some “Do’s and Dont’s” for resume preparation, and cover some security specific interview questions. Resources Slides
About the Meeting We will be conducting a series of lightning fast talks designed to introduce the tops of steganography, web application security, and video game security. We wil also be reviewing current events in the world of infosec, provide general club information, and reveal a series of hands-on workshops we are planning to host… Read more »
About the Meeting Andy Giron will be covering Android Hacking. Mobile security is not something we have an opportunity to talk about too often so be sure to come out. His presentation will include a demo of GoatDroid. Perhaps you have heard of WebGoat.
Post-Meeting Resources Meeting Slides Fuzzing Slides About the Meeting Grant Hernandez is coming in to teach us all about fuzzers and the way their magic works. Fuzzing is a very necessary step when it comes to doing automated vulnerability research on applications. One of the more popular tools in this space is AFL (American Fuzzy… Read more »
About the Meeting Gaelan Adams, a long time member of the club, is going to give a presentation on working with SIEMs with some great life skills sprinkled in. Log analysis and event management are incredibly powerful tools when it comes to studying security threats. Mr. Adams will be sharing about some of the more… Read more »
Post-Meeting Resources Meeting Slide Deck Cyber Quest Slides Workshop Needs About the Meeting We have a special guest again this week. Endgame‘s Andrew Righter is coming out to present on Hardware Vulnerability Research. We talk plenty about the software side; now it is time to dig a little deeper.
Post-Meeting Resources Meeting Slide Deck Physical Security: From Locks to Dox Slide Deck (PDF) About the Meeting Lock picking. It is time to learn about all of the locks out in the world, and their various insecurities. Physical security is just as important to understand as computer security because with physical access to devices, one… Read more »
Post-Meeting Resources Meeting Slide Deck Magstripe “Security” Slide Deck About the Meeting This week, Alex Davis will present on the capabilities that cheap electronics—the ones you purchase from places like RadioShack and TigerDirect—give you. Mr. Davis likes to tinker with these sorts of electronics and has some fun to show.