Archives for 2010

HackMiami Holiday Party & Samurai CTF v2 Challenge

Join us for our Holiday / End of the Year Hack-A-Thon Party on December 11, 2010! This will be the last Hack-A-Thon of the year, so make it count! We will be showcasing the latest incarnation of the Samurai CTF Hacking simulation, with all new levels and challenges. There is no cost to participate. Everyone […]

HackMiami Hack-A-Thon – 11/20/2010 – Taking place in Tampa, FL – Web Hacking Workshop

This weekend’s HackMiami event will take place in Tampa, FL as we get together with the Whitehatters Security Club for an afternoon of CTF and live hacking demonstrations. Rod will present a method of owning a domain controller through a web app vulnerability using the BeEF framework + metasploit. Jason will present methods of AntiVirus […]

Hackmiami researchers are featured in 3 articles

Hackmiami researchers are featured in 3 articles about their work with botnets. They also recently spoke at OWASP AppsecDC 2010 conference in Washington DC. article article article

HackMiami Hack-A-Thon – 11/6/2010 – Owning IT Automation (Part Deux)

Last meeting we beat the crap out of a popular IT automation software package, this meeting we intend to finish it off. Join us as we go through the various vulnerabilities we have discovered over the last two weeks. IT Automation software is used by enterprise networks to manage large swaths of machines. They function […]

HackMiami researcher releases 0day Multi-Vendor AntiVirus Vulnerability at Hacker Halted Conference

(Miami, FL) – HackMiami researcher Jason of revealed a 0day muti-vendor AntiVirus bypass vulnerability at the Hacker Halted conference in Miami last Thursday. After disclosing the vulnerability to vendors and awaiting a patch release by McAfee, Jason presented the proof of concept methodology at the conference by successfully executing malicious code on target machines […]

HackMiami Hack-A-Thon – 10/16/2010 – Owning IT Automation

IT Automation software is used by enterprise networks to manage large swaths of machines in a single go. They function with a client/server relationship where an administrator can remotely access systems within the network in order to work with them. In other words, they function a lot like botnets, and for the most part, are […]