The topics for these meetings will be anything that is related to Incident Response, host / network forensics or detection.
Wednesday, August 20, 2014
Mi4n6 Reboot
We are going to spin the group up again but decided to make it quarterly instead of monthly. Because of the large student base we'd like to have one student presentation and one industry professional presentation as the format. First meeting is on September 17th at 7:00 PM. Please let us know if you'd like to present.
Thursday, January 2, 2014
Call for presentations - Meeting January 22nd
Welcome to the New Year! We'll be having or first meeting January 22nd and are currently looking for speakers.
Tuesday, November 19, 2013
No meeting November 20th
No
Monday, October 21, 2013
October 23 Meeting: TLS decrypting and Linux Backdoor
We have two great talks scheduled:
Your Browser Knows Your Secrets : Decrypting TLS Web Traffic with Wireshark
@sallyvdv presentation will show how some current browsers make it very easy to export cryptographic keys that can be used with Wireshark to decrypt captured TLS network data.The Linux Backdoor Attempt of 2003
@bradvoth will be discussing what the code inserted did, how to activate it, how the code got into the tree, what it means for developers and organizations; including prevention and detection.Oh and @jbc22 says there will be pizza this time. Hope to see you there!
Thursday, October 10, 2013
Speakers needed
We are in need of presentations for Wednesday October 23 meeting. If you have an idea please contact @jbc22 or @jsherenco.
Tuesday, August 13, 2013
September meeting - Incident Titan
Join us as Jaron Bradley walks you through "Incident Titan" by demoing the following lessons
strictly from a forensic host based analyst standpoint:
o Pin pointing the attacker’s initial
point of entry into company network
o Analysis of Malware found on hard drive
o Detecting lateral movement across network
o Analysis of attacker techniques and
methodologies
o Detecting stolen data off a company
network
o Tracing attacker techniques through
memory analysis
Subscribe to:
Posts (Atom)