Don’t miss a second! Check out what [email protected] is up to.

Meeting :: Locks and Votes (4/15/2016)

About the Meeting This week, don’t miss Jericho covering lock picking and making shims. We’re going to bring locks to practice on during the meeting so be sure to come out to increase your lock picking skills. Lastly, [email protected] has been invited to join the Electronic Frontier Alliance (EFA) which is a grassroots network formed… Read more »

Meeting :: Mega Meeting (4/8/16)

About the Meeting This week we team up with TechKnights to present an evening of auditing code. We’re teaching some of the pitfalls of writing code showing examples of epic security failures using code the presenters have personally written. We’ll try to cover the whole gauntlet of both low hanging fruit and less obvious facepalms.

Meeting :: Fuzzing and Forensics (4/1/16)

About the Meeting This Friday come prepared for back-to-back talks in Fuzzing and Memory Forensics presented by our VP, Shane, and Carrie Chenicek. What’s fuzzing? Throwing stuff at a wall (or binary) and seeing what sticks. Come learn the history of fuzzing, types of fuzzers and fuzzer frameworks, and how you can use fuzzing as… Read more »

Meeting :: Web Application Testing (3/4/16)

About the Meeting We know you’re antsy to begin your spring break, but don’t miss out on a day in the life of a web application penetration tester! Willa Riggins from Veracode will go over the tools she uses on a daily basis and what she uses them for. This is a great opportunity to… Read more »

Meeting :: Deep vs. Dark (2/26/16)

About the Meeting This week prepare for a deep dive into the hidden world of the deep web and dark web (turns out there’s a difference!). With a presentation on the darkest parts of the internet and the ways by which anonymity fails, we hope you’ll have quite the adventure in onionland

Meeting :: Social Engineering: Part Two (2/19/16)

About the Meeting Join us this week for part II of the social engineering talk covering the finer points of information gathering, tools for your toolkit, and a walkthrough providing tips on reconnaissance strategy.

Meeting :: Social Engineering: Part One (2/12/16)

About the Meeting This week will be a social engineering presentation by Heather Lawrence. This will start a two part series on social engineering covering elicitation, pretexting, mind tricks, and neurolinguistic programming. Next week we’ll cover part two with recon and information gathering. Slides: Main presentation (Heather’s slides):

Meeting :: All Fun and Games (2/5/16)

About the Meeting This week Ditmar Wendt will be covering the approach he takes to analyzing and writing hacks for Counter-Strike: Global Offensive. This slide deck also includes some advice for dealing with identity theft. Next week (2/12) Heather Lawrence will start a two part series on social engineering covering information gathering, elicitation, pretexting, mind… Read more »

Meeting :: FireEye (1/29/16)

About the Meeting Don’t miss this week’s presentation on Windows Forensics led by our very own Joe Pate from FireEye! There will be a deep dive into the process and techniques as well as a walkthrough of an investigation. Slides (FireEye slides not released for publication):