11-23-2013 Printing guns with Makerbot

MakerBot

Printing guns with Makerbot         The Hussla will speak about the implications of 3-D printing in regards to the making of gun parts. How to get started on 3-D printing and the current examples available on the web. The legal implications and future challenges of these type of technologies. More info about […]

11-09-2013 Scripting for Pentesters – Hacking the bot

percent27background

November 09th meeting will cover the following items: Scripting for Pentesters           @n1tr0g3n_com   from Team CTFU will go over some basic scripts that can be used by Penetration Testers during assessments.   Hacking the bot               The Hussla will go over a project that consist […]

10-26-2013 CTF 101

capture the flag

On October 26th we will cover the following topic: Computer security Capture The Flag games: – What are they? – Is it only for UBER technical people? – NO – What gear do I need to play in one? – How can I make a team and play? – Where do I get information about […]

10-12-2013 Introduction to Scapy and Capture The Packet

Tcpdump

Introduction to Scapy and Capture The Packet           On November 12th we will have a presentation by @acex0r giving an introduction to the manipulation packet tool named SCAPY. Following the presentation we will have a small Capture The Packet game so attendants can apply some of the concepts and techniques given […]

9-28-2013 Dark side of Social Media & SE, Data Loss Prevention

110_danger_social_media

On September 28th we will have two presentations: Dark side of Social Media & Social Engineering Presenter will go over of the malicious vectors that can be used against individuals in current popular social media sites, as well as the Social Engineering dangers in such sites. Presenter: Tony Anytime     Data Loss Prevention   Dr. […]

8-31-2013 Introduction to Packet Analysis, VoIP Vulnerabilities and Exploitation

SharpPcap

On Saturday August 31st we will have two presentations: Introduction to Packet Analysis         King Tuna will go over the basics of analyzing network traffic, how to spot malicious traffic and the different tools you can use to conduct network monitoring and forensics.   VoIP Vulnerabilities and exploitation         […]