Don’t miss a second! Check out what [email protected] is up to.

Meeting :: Down to Business (1/27/2017)

About the Meeting Join us in ENG2-102 at 4:30pm for a talk about how to speak business and an intro to Latek with Gaelan Adams. We’ll cover business euphemisms and how to get your company to do what you want. For tool-time this week we will be going from zero to hero with, arguably one… Read more »

Meeting :: First of the Year (1/20/2017)

About the Meeting Welcome back! Join us for our first meeting of the semester on 1/20 in ENG2-102 at 4:30pm for a refresher on how to CTF and demystifying regex. Meeting Slides: https://docs.google.com/presentation/d/1R7AXAVHgj7rGKVO-MR6JQjDfrnhQnNwc3mjujEVwgrQ/edit?usp=sharing

Meeting :: Exploit Finale (12/2/2016)

About the Meeting For our signoff meeting, Ditmar Wendt will cover Metasploit – the basics, what it is, and how you can improve your proficiency with the Metasploit framework. Also, we will be covering Netcat and Socat for tool-time this week. Our first meeting of the spring semester is tentatively scheduled for January 20th, 2017…. Read more »

Meeting :: Texas Instruments (11/18/2016)

About the Meeting Jimi Mills from the Texas Instruments (T.I) Security Operations Center will be presenting an enterprise IT perspective on malware and infection paths with examples from a network security monitoring view including analysis and tools. This walkthrough will include examples of packet captures, implementation of tools such as Suricata IDS, and extracting and… Read more »

Meeting :: Build your own NSA (11/11/2016)

About the Meeting This week Gaelan Adams will be covering a talk titled “Building your own internal NSA”, the talk will cover SIEMs (Security Information Event Monitors), data acquisition, and the foundations for building your own system from scratch. Also we will be covering Powershell Empire, a powerful Post-Exploitation Framework made entirely with powershell, during… Read more »

Meeting :: Protiviti (11/4/2016)

About the Meeting This week [email protected] presents hosts Protiviti, a security consulting firm. They will be presenting “Today’s Industries, Tomorrow’s Trends, and Past (real) Examples”. Also we will be covering John the Ripper, an open-source password cracking tool, during tool-time this week. Make sure you catch us in ENG2-102. Meeting Slides: https://docs.google.com/presentation/d/1sEDNcKpkz4K0UQWHbUbtmb89hpiLB00Ztk0dYX44ZWQ/edit?usp=sharing

Meeting :: Phreaking (10/28/2016)

About the Meeting Ever wonder how random websites know what things you last visited? Are you tired of hacking computers? Join us for a talk on Browser Fingerprinting, and Phone Phreaking. We will also be covering another unique tool during tooltime as well. Meeting Slides: https://docs.google.com/presentation/d/1XiBcPnZR3JvTtKSnKSYAInct3x-s2bdPGChxlgx0SU4/edit?usp=sharing

Meeting :: Bugcrowd (10/21/2016)

About the Meeting This Friday in HEC-125 we have a talk from Bugcrowd, a bug-bounty platform. This week for tool time we will be covering Autopsy, a open source digital forensics platform used by law enforcement, military, and corporate examiners to investigate what happened on a computer. Meeting Slides: https://drive.google.com/open?id=1EZr3srPEWTlYYoq7q8B90AK9e8FLkk63UNU4WJ86hcA Bugcrowd Slides: https://drive.google.com/open?id=0B0N05FlOnPXWU0dLT08ydkRTNlU

Meeting :: Facebook Security (10/14/2016)

About the Meeting Interested in becoming a Security Engineer? How about a Security Analyst? Interested in learning about what a Security Engineer or Analyst even does? Come learn all about careers in Security and about Facebook’s awesome security team! The Security team at Facebook protects the security and privacy of over a billion people, is… Read more »

Meeting :: Amazon Security (9/30/2016)

About the Meeting This meeting will include a light overview of incident response, beginning with the phases of incident handling and responsibilities of a dedicated IR team, presented by Amazon’s Information Security team. Bring your resumes to the meeting if you are interested in internships or full-time opportunities with Amazon Information Security.