Check out our meeting topics and be on the lookout for meeting resources.
About the Meeting Are you interested in modern day exploitation and vulnerability research? Come see what it’s really like! After this presentation, you will never trust anything again. For tool-time this week we will be going over ngrok – a reverse proxy for local services used to connect applications. See the slides here.
About the Meeting If you’ve ever been curious about defeating tamper controls (e.g. VOID stickers, tape that leaves a residue, or wire tags) this week (2/24) we’re walking through how to defeat these tamper controls with a practice box of your own! We will split into small groups in order to have everyone try to… Read more »
About the Meeting This meeting we will explore iOS vulnerabilities and how they have been exploited by jailbreak tools as well as exploit mitigations implemented by Apple to combat these attacks. These exploits and mitigations will be covered from a high level while still detailing internal undocumented security features on iOS We will also be… Read more »
About the Meeting Join us for our next meeting on 2/3 in ENG2-102 at 4:30pm for an interactive talk about Forensics. We’ll be delving through pcaps – so have your Wireshark or tshark ready if you want to follow along. Meeting Slides: Here
About the Meeting Join us in ENG2-102 at 4:30pm for a talk about how to speak business and an intro to Latek with Gaelan Adams. We’ll cover business euphemisms and how to get your company to do what you want. For tool-time this week we will be going from zero to hero with, arguably one… Read more »
About the Meeting Welcome back! Join us for our first meeting of the semester on 1/20 in ENG2-102 at 4:30pm for a refresher on how to CTF and demystifying regex. Meeting Slides: https://docs.google.com/presentation/d/1R7AXAVHgj7rGKVO-MR6JQjDfrnhQnNwc3mjujEVwgrQ/edit?usp=sharing
About the Meeting For our signoff meeting, Ditmar Wendt will cover Metasploit – the basics, what it is, and how you can improve your proficiency with the Metasploit framework. Also, we will be covering Netcat and Socat for tool-time this week. Our first meeting of the spring semester is tentatively scheduled for January 20th, 2017…. Read more »
About the Meeting Jimi Mills from the Texas Instruments (T.I) Security Operations Center will be presenting an enterprise IT perspective on malware and infection paths with examples from a network security monitoring view including analysis and tools. This walkthrough will include examples of packet captures, implementation of tools such as Suricata IDS, and extracting and… Read more »
About the Meeting This week Gaelan Adams will be covering a talk titled “Building your own internal NSA”, the talk will cover SIEMs (Security Information Event Monitors), data acquisition, and the foundations for building your own system from scratch. Also we will be covering Powershell Empire, a powerful Post-Exploitation Framework made entirely with powershell, during… Read more »