03-14-2015 IDS+Honeypots Making Security Simple

idsdiagram

IDS+Honeypots Making Security Simple Everything you really need to know about IDS (Intrusion Detection Systems) Combining with HoneyPots. Deployment and usage techniques used in the past and today. How to setup and deploy onto any network including the cloud. Reasons why this should be used in all networks. How to bring BIG DATA down to Small […]

02-28-2015 Yara Rules

yara

Greg Lindor will be giving a presentation about understanding, writing and working with YARA rules, a popular tool among malware researchers to identify, classify and share information. YARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used through its command-line interface or from your own Python scripts with the yara-python […]

02-07-2015 DARPA Cyber Grand Challenge

Darp Cyber Grand Challenge

DARPA Cyber Grand Challenge In 2016, DARPA will hold the world’s first all-computer Capture the Flag tournament live on stage co-located with the DEF CON Conference in Las Vegas where automated systems may take the first steps towards a defensible, connected future. Seth Wahle will give a presentation with the details of the cyber grand […]

12-20-2014 HackmiamiCon 2015 CFP, P0wn OFF 2014 report

2015 HackMiami Hacker's Conference

12-20-2014 HackmiamiCon 2015 CFP, P0wn OFF 2014 report   On December the 20th, 2014 we will be having our last meeting of this year. We will review what we’ve accomplished and what we would like to accomplish for 2015. Hackmiami Conference 2015 Call For Presentations will be officially opened and we will review the results […]

CBS4 Report: Using Wi-Fi to Hack Phones

cbs4

MIAMI (from:  CBS Miami) — If you have a smartphone or laptop chances are you have used free Wi-Fi before. But what you may not know is that you are putting yourself at risk to be hacked. CBS4’s David Sutta teamed up with a group called HackMiami to see exactly how it was done. The […]

10-04-2014 Arch Assault Distro – DemonSaw

110_demonsaw

Arch Assault Pentest Distro                Marcus B. Will give us an introduction on how to install, use and update Arch Assault penetration testing distribution. He will also give us a comparison between Arch Assault and other penetration testing distributions.  More information about this distribution at https://archassault.org/   DemonSaw “Demonsaw is […]