05-03-2014 Debugging 101

OllyDbg

Debugging 101 In this presentation. We will cover some of the basic terminologies and methodologies behind debugging applications. Some of the topics included will be utilizing breakpoints, Analyzing the stack and understanding the data dump and how it all works together. Additional topics include using debuggers to analyze algorithms and identify software behavior.   We […]

O4-19-2014 Pentest 101

capture the flag

Pentest 101 by Rod Soto By popular demand, this interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation.   This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you […]

03-22-2014 Reversing Iphone Apps, Hacking iOS

mobile reversing

 Reversing Iphone Apps, Hacking iOS NewMane will present on the basics of reversing  Iphone/iOS applications. He will also provide information on the basics of looking for vulnerabilities in iOS.   Hackmiami Conference 2014  We will be providing details on talks, workshops, speakers, CTF and all the good stuff being prepared for the conference. Register now […]

03-08-2014 PCAP Analysis, SOC architecture

soc

PCAP Analysis             Alex will give an overview of wireshark and tcpdump. He will also set up a lab environment where participants can apply the concepts given during the presentation. This hands on workshop will show participants how to discover malicious traffic and malware by analyzing network traffic. SOC Architecture […]

02-22-2014 HTML5 exploitation, BEEF2

vacalactica

02-22-2014 HTML5 exploitation, BEEF2   Mobmane will be presenting on methods of exploiting applications developed in HTML5 language. He will also be showing how to use BEEF2 (Browser exploitation framework 2), which is a penetration testing tool used to probe and exploit vulnerabilities in internet browser applications such as Safari, Firefox, Chrome and Internet Explorer. […]

02-08-2014 Effective Red Team Techniques, Operational Risk Management

Effective Red Team techniques A  Red Team exercise in the context of penetration testing is a procedure where security professionals probe an organization’s security without their knowledge. Jason Bunch will be presenting on the most effective techniques when performing these type of exercises. Operational Risk Management Francisco will be giving an introduction to Operational Risk […]