The Hackable Badge Contest

HackMiami Conference

Is it a badge hack?  Is it a cypto challenge?  Is it a scavenger hunt? Why yes, yes it is! The hackable badge contest is making its initial appearance at the HackMiami conference this year.  The objective of the contest is to involve all who know about or want to learn about Near Field Communications […]

05-06-2015 Pentest 101

hackmiamilogo

Penetration testing 101 This interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation. This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you can choose your own training […]

04-18-2015 Intro to SS7: What is it & why you should care

ss7

Signaling System No. 7  is a suite of protocols that have been used in telecommunications since the 1970s. It plays a major role in the standing up and tearing down of traditional communication. We will discuss how the system works and impacts your daily life. Presenter: Haxathlon     2 PM 1200 S Federal Hwy […]

04-04-2015 Capture The Packet

darksyphon

      On Saturday  April 4th, 2015 we are going to have a capture the packet competition. Bring your laptop and be ready to grep like a champion!. This will be a warm up for Bsides Orlando 2015 happening on April 10th-11th. Get your tickets and be ready to play K&&K CTF 4!. Hackmiami […]

03-14-2015 IDS+Honeypots Making Security Simple

idsdiagram

IDS+Honeypots Making Security Simple Everything you really need to know about IDS (Intrusion Detection Systems) Combining with HoneyPots. Deployment and usage techniques used in the past and today. How to setup and deploy onto any network including the cloud. Reasons why this should be used in all networks. How to bring BIG DATA down to Small […]

02-28-2015 Yara Rules

yara

Greg Lindor will be giving a presentation about understanding, writing and working with YARA rules, a popular tool among malware researchers to identify, classify and share information. YARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used through its command-line interface or from your own Python scripts with the yara-python […]