07-11-2015 Hackerville, REMnux

Hackerville We will be playing and discussing the Hackerville documentary.  REMnux         REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can examine malware, yet might be […]

06-20-2015 Docker, HackmiamiBT

Docker Docker is a tool that can package an application and its dependencies in a virtual container that can run on any machine. This helps enable flexibility and portability on where the application can run, whether on-premise, public cloud, private cloud, bare metal, etc. We will have a hands-on session on Docker, and take a […]

06-06-2015 Virtualization & Cloud Security Challenges

              Virtualization & Cloud Security Challenges Rod Soto will talk about attack vectors, security shortfalls, mitigation and defense techniques in most commonly used Virtualization technologies such as Hyper-V, Vsphere, Xen Server/XenApp. There will also be a discussion on security implications in current cloud environments and continuous move of organizations into […]

05-06-2015 Pentest 101

Penetration testing 101 This interactive workshop will provide attendants with basic information about researching vulnerabilities/exploits, identifying running services/ports/, exploit research, exploit validation. This workshop will give you an overview of Penetration testing and will also provide you information about training offerings available, magazines, toolz , websites, competitions, etc., so you can choose your own training […]

04-04-2015 Capture The Packet

      On Saturday  April 4th, 2015 we are going to have a capture the packet competition. Bring your laptop and be ready to grep like a champion!. This will be a warm up for Bsides Orlando 2015 happening on April 10th-11th. Get your tickets and be ready to play K&&K CTF 4!. Hackmiami […]

03-14-2015 IDS+Honeypots Making Security Simple

IDS+Honeypots Making Security Simple Everything you really need to know about IDS (Intrusion Detection Systems) Combining with HoneyPots. Deployment and usage techniques used in the past and today. How to setup and deploy onto any network including the cloud. Reasons why this should be used in all networks. How to bring BIG DATA down to Small […]