How I got Hacked

Presenter: Gregory Hanis Abstract: Understanding an Attack Surfaces and the misconception along with my theory on how to improve it. The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker") can try to enter data to or extract data from an environment.  Due to the increase in the countless potential vulnerable points each enterprise has, there has been increasing advantage for hackers and attackers as they only need to find one vulnerable point to succeed in their attack. what to bring: yourself
Read More

Getting HAM Radio Certified

Presenter: Brad Ikerman Abstract: HAM Radio is an integral part of emergency communications. From Hurricanes to Earthquakes, it allows for people to communicate without the needs of major infrastructure.  This talk will discuss what HAM Radio is, how to get your license, and some of the interesting things that can be done from within the community. What to Bring: Yourself
Read More

ElasticSearch Stack

Presenter: Jacob Henson Abstract: An overview of the Elastic Stack and how it is used to centralize logging as a replacement to SPLUNK. It can be very useful when attempting to identify problems with your servers or applications, as it allows you to search through all of your logs in a single place. It is also useful because it allows you to identify issues that span multiple servers by correlating their logs during a specific time frame. What to Bring: Yourself
Read More

Getting HAM Radio Certified

Presenter: Brad Ikerman Abstract: HAM Radio is an integral part of emergency communications. From Hurricanes to Earthquakes, it allows for people to communicate without the needs of major infrastructure.  This talk will discuss what HAM Radio is, how to get your license, and some of the interesting things that can be done from within the community. What to Bring: Yourself
Read More

Social Event

Social Gathering. play with old computers... do a ctf.. who knows we will be doing a social event.. location yet to be determind
Read More

The Blockchain and the Future of Cybersecurity

Presenter: Jason Cuneo Abstract: The revolution of blockchain centered technologies provides security practitioners with a unique opportunity to participate in shaping the future of secure networking and has the potential to redefine how organizations and society transact and determine value. The objective of this discussion is to introduce how blockchains are disrupting the status quo and how they can be used to improve the Cybersecurity landscape. What to Bring: Yourself
Read More

Cyber Investigations

Presenter: Brad A. Abstract: Little talk on cyber crimes and investigations by law enforcement pov. Some campfire stories to be told don't want to miss this talk. Very insightful in the minds of criminals and their mistakes. What to Bring: Yourself
Read More

Hacker Bootcamp Server Build and Install Day

Hardware has arrived!  This week we will take the time to put our servers together, install its operating system. Important! About Course: Bring $10 dollars to stay during course hour. Cash only. About Hardware Pick-up: Those who ordered hardware for the CTF training, please come to pick-up your kit. If you haven't paid yet, cost is $25 for your kit. Cash only. Hardware List: The following is the standard hardware we ordered for the training. You can bring your own Raspberry/Orange Pi kit, however you will need to adapt the instructions to your specific hardware. • Makerfocus Orange Pi Zero H2 Quad Core Open-source 512MB Development Board with Wifi Antenna • Makerfocus Orange Pi Zero Expansion Board Interface Board Development Board • 5V/2A AC Micro USB Power Supply Adapter • Makerfocus Orange Pi Zero…
Read More

Corgi’s, Pterodactyls, and the Russian Ebook Wars

Come listen to the presentation that gave much to talk about during the National Cyber Summit. This talk will be an interesting discussion about the unique good, the bad, the funny, and the sad things that happen at the dark edges of the internet. Presented by Seth Wahle https://www.linkedin.com/in/sethwahle https://twitter.com/SethWahle
Read More

Port scanning with Node.js

- A brief overview of what Node.js is and how it works. - Reasons to write your own port scanner in Node.js - A live demo showing a Node.js port scanner execute as well as a code review explaining how to build one with a simple portscanner library as well as manually with a default socket library. Presented by Dutch
Read More