O4-19-2014 Pentest 101

capture the flag

Pentest 101 by Rod Soto By popular demand, this interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation.   This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you […]

03-22-2014 Reversing Iphone Apps, Hacking iOS

mobile reversing

 Reversing Iphone Apps, Hacking iOS NewMane will present on the basics of reversing  Iphone/iOS applications. He will also provide information on the basics of looking for vulnerabilities in iOS.   Hackmiami Conference 2014  We will be providing details on talks, workshops, speakers, CTF and all the good stuff being prepared for the conference. Register now […]

03-08-2014 PCAP Analysis, SOC architecture

soc

PCAP Analysis             Alex will give an overview of wireshark and tcpdump. He will also set up a lab environment where participants can apply the concepts given during the presentation. This hands on workshop will show participants how to discover malicious traffic and malware by analyzing network traffic. SOC Architecture […]

02-22-2014 HTML5 exploitation, BEEF2

vacalactica

02-22-2014 HTML5 exploitation, BEEF2   Mobmane will be presenting on methods of exploiting applications developed in HTML5 language. He will also be showing how to use BEEF2 (Browser exploitation framework 2), which is a penetration testing tool used to probe and exploit vulnerabilities in internet browser applications such as Safari, Firefox, Chrome and Internet Explorer. […]

02-08-2014 Effective Red Team Techniques, Operational Risk Management

Effective Red Team techniques A  Red Team exercise in the context of penetration testing is a procedure where security professionals probe an organization’s security without their knowledge. Jason Bunch will be presenting on the most effective techniques when performing these type of exercises. Operational Risk Management Francisco will be giving an introduction to Operational Risk […]

1-25-2014 Cyberstalking and Google Dorking

doxx

Cyberstalking  and Google Dorking Ace X0r  will show the different ways of using search engines and most specifically google to obtain sensitive information about people. He will also show how easy is to DOXX an individual using commonly known public sources of information, and the possible ways malicious actors can use them to cyberstalk their victims. […]