Check out our meeting topics and be on the lookout for meeting resources.
About the Meeting This week, we want you (to vote in elections)! No seriously, we need you to vote for the next round of elected officials to take over for the next year. Your next executive board will be responsible for content planning and club organization so vote wisely! Please note you must be a… Read more »
About the Meeting The internet as we know it has become a scary place — with attacks abound, zero-day vulnerabilities in critical infrastructure, and progressively easier ways to hand over the keys to the kingdom to attacks. Join us this Friday to learn about the offensive capabilities of a number of recent cyber attacks, and… Read more »
About the Meeting Join us this Friday to learn about using various cloud hosting providers such as Amazon AWS to host your own virtual private servers! We will demonstrate how to create cloud hosted virtual machines and add SSH keys for remote administration with SSH clients like PuTTY. See the slides here.
About the Meeting Join us this week for a social engineering presentation by Heather Lawrence and Robert Tonic. We will be going in-depth on various social engineering topics covering elicitation, pretexting, mind tricks, neurolinguistic programming, and information gathering. Also, we will be covering the Social Engineering Toolkit (SET) for tool-time this week. See the slides… Read more »
About the Meeting This week, Vector 35 will be here to demo Binary Ninja, their powerful (yet affordable) reverse engineering platform. They will be going over the PwnAdventure series of hackable video games, including the differences between them, the tools involved with solving the challenges, and how Vector 35 created them. See the slides here.
About the Meeting FireEye will be presenting on the “Anatomy of an attack – It’s a ‘who’ not a ‘what’.” This presentation will take you through a typical Red Team Engagement and demonstrate why penetration testing may not provide an accurate representation of a sophisticated threat actor. See the slides here.
About the Meeting Are you interested in modern day exploitation and vulnerability research? Come see what it’s really like! After this presentation, you will never trust anything again. For tool-time this week we will be going over ngrok – a reverse proxy for local services used to connect applications. See the slides here.
About the Meeting If you’ve ever been curious about defeating tamper controls (e.g. VOID stickers, tape that leaves a residue, or wire tags) this week (2/24) we’re walking through how to defeat these tamper controls with a practice box of your own! We will split into small groups in order to have everyone try to… Read more »
About the Meeting This meeting we will explore iOS vulnerabilities and how they have been exploited by jailbreak tools as well as exploit mitigations implemented by Apple to combat these attacks. These exploits and mitigations will be covered from a high level while still detailing internal undocumented security features on iOS We will also be… Read more »