Check out our meeting topics and be on the lookout for meeting resources.

Cicada 3301 (10/31/14)

Post-Meeting Resources Meeting Slide Deck Cicada 3301 Slide Deck About the Meeting This Friday is Halloween! And in the spirit of spooky uneasiness, we’ve got some advanced stenography in the form of the hunt for the clues left around the internet and around real life by the enigmatic Cicada 3301. Heather Lawrence is going to… Read more »

Video Game Hacking 2 (10/24/14)

About the Meeting We have got some more game hacking going on! Alex Lynch, who you might recognize from earlier in the semester, will be presenting on the much neglected other things that a lot of video games have: websites, in-game shopping carts, and more! Tool Time this week will include two extremely powerful tools… Read more »

Video Game Hacking (10/17/14)

About the Meeting Join us this Friday as Knightsec captain Ditmar Wendt goes over hacking video games and an overview of all it entails – DLL injection, entity tables, aimbots, calculus, video overlays, and more! This week will be (surprisingly) digestable for computer laymen, so all skill levels are welcome! In current events we’ll try… Read more »

Address Resolution Protocol (10/10/14)

About the Meeting Join us this Friday for a talk on abuse of Address Resolution Protocol (ARP)—or in layman’s terms, the bad things that can happen when an attacker and a victim computer are both behind the same router! Specifically, we’ll be talking about and demonstrating ARP poisoning, which is telling a computer on the… Read more »

Inject, Inject (10/3/14)

About the Meeting One of our very own members, Kevin Brown, will be leading a talk on the Number One need to know from OWASP Top Ten, Injection! That’s right folks, we are going to see the oh so notorious SQL Injection during this meeting. “How does it work?” “How can we prevent it?” Your… Read more »

Hacking Exposed (9/26/14)

About the Meeting This week, our main topic is learning how to destroy things with Metasploit! We hope you signed your ethics statements, because now we’re going to teach you why having Kali Linux on hand could prove useful in a security engagement. We’ll take a dive into the chaining of tiny components to form… Read more »

CSAW CTF Preview (9/19/14)

About the Meeting This Friday’s meeting will be all about CSAW 2014, challenges from past CSAWs, and the tools you might need to play in it! We’ll also go over a little bit about the Women in STEM panel below and our current events – such as installing Doom on a Canon printer and a… Read more »

Protiviti Shares Security (9/12/14)

Post-Meeting Resources Slide Deck About the Meeting Welcome to the fourth week of school, you student hackers you. Bring your resume this Friday! We’re proud to announce the return of Protivi, a global security consulting firm, to presentations at [email protected]! For the bulk of our meeting, a few people from Protiviti will be talking about… Read more »

The Internet + Security (9/5/14)

Post-Meeting Resources Slide Deck About the Meeting Join us this Friday for our main event: student member Alex Lynch giving an overview of how you use the internet, exactly, and where security plays into the big jumble of computer equipment that we call the internet. In our review of current events, we’ll be reviewing what… Read more »

Client-side Program Decompilation by Willa Riggins (4/11/14)

We have yet another awesome guest speaker this Friday! She will cover topics including client-side program decompilation. Willa Riggins works with Lockheed Martin, spoke at Security B-Sides Orlando this last weekend, and used to run DC407. There will be lots of awesome demos and discussions. Make sure you come out to the meeting at 4:30… Read more »