Archives for 2010

HackMiami and South Florida ISSA Chapter presents Capture the Flag event August 14th

Mark your calendars and get your tools ready. The annual South Florida Hack the Flag and Chili Cook Off will be held Saturday August 14, 2010 from 12:00pm – 5:00pm at the Westin Ft. Lauderdale – 400 Corporate Drive Fort Lauderdale, FL 33334 UPDATE! – CASH PRIZES ANNOUNCED! – $500 1st place; $300 2nd place; $200 3rd place […]

Hackathon Saturday August 7th 2010

Join us for a Defcon 18 review and a speech on Social Engineering. Poison Apples: Physical Media Social Engineering By: David Martinez As more and more workplaces become increasingly aware of both their physical and digital security needs, one factor remains a weak link; Human curiosity. As a result, Social Engineering attacks and techniques have become […]

Download the Defcon 18 CD-ROM

Did you miss Defcon? Were you unable to go? Did you go and not see all the talks you wanted? Check out the CD-ROM from the conference, chock full of PDF’s and tools from all the presentations.

HackMiami Hack-A-Thon – 7/24/2010 – Hacking Citrix Vulns + Review of HOPE

Join us this Saturday 7/24/2010 for a joint HackMiami / South Florida OWASP event! We will feature a presentation by DIckson Kwong that will outline several vulnerabilities in Citrix servers, as well as an analysis of their architecture and configurations. DIckson Kwong is a local security researcher who is employed as a vulnerability analyst for […]

HackMiami arrives at Hotel Penn for The Next Hope

HackMiami has arrived at the Hotel Pennsylvania and is setting up a table at the Hackerspace Village. Follow the events on Twitter on @hackmiami and @thenexthope. Here is a list of the talks that will include members of HackMiami – Hackerspaces Forever: A Panel Presented by Friday 2100 Tesla (2 hours) Nick Farr (HacDC, […]

HackMiami Hack-A-Thon – 7/10/2010 – Man-In-The-Middle (MITM) Attacks

Join us Saturday 7/10/2010 at 1:00pm for a HackMiami Hack-A-Thon revolving around  the various types of MITM attacks! Presenting  is Pert Trepi aka TipSc on how to perform Man-in-the-Middle attacks using  various tools currently available.  A simple overview of the tools and various techniques being presented are as follows: Types of Attacks: ARP Poisoning SSH […]