Thursday, September 4, 2014

September 17th agenda


Forensic on Forensics - @sallyvdv

For a student just getting started in digital forensics, concepts regarding forensic images can be confusing.  Terminology like images, clones, bit-stream copies and forensic images are often used inconsistently, further complicating the issue.  This talk will attempt to clear up the confusion by presenting an instructive clarification of what a forensic image is as well as what it is not.   In addition, it will provide a comprehensive look at several different free tools to create forensic images along with methods to access the embedded data.  


Hunting open source for internal evil - @bl4ck_0ut

1) Blog hunting
2) Feed hunting
3) Hash tag hunting

It'll be at 7 PM at EMU Livonia campus, room number to follow.  Food will be provided.

Wednesday, August 20, 2014

Mi4n6 Reboot

We are going to spin the group up again but decided to make it quarterly instead of monthly.  Because of the large student base we'd like to have one student presentation and one industry professional presentation as the format.  First meeting is on September 17th at 7:00 PM.  Please let us know if you'd like to present.

Thursday, January 2, 2014

Call for presentations - Meeting January 22nd

Welcome to the New Year!  We'll be having or first meeting January 22nd and are currently looking for speakers. 

Tuesday, November 19, 2013

No meeting November 20th


No meeting tomorrow couldn't dig up a speaker. We'll be Claddagh Irish Pub instead.  Have a safe and happy holidays see you in January.


Monday, October 21, 2013

October 23 Meeting: TLS decrypting and Linux Backdoor

We have two great talks scheduled:

Your Browser Knows Your Secrets : Decrypting TLS Web Traffic with Wireshark

@sallyvdv presentation will show how some current browsers make it very easy to export cryptographic keys that can be used with Wireshark to decrypt captured TLS network data.

The Linux Backdoor Attempt of 2003

@bradvoth will be discussing what the code inserted did, how to activate it, how the code got into the tree, what it means for developers and organizations; including prevention and detection.

Oh and @jbc22 says there will be pizza this time.  Hope to see you there! 



Thursday, October 10, 2013

Speakers needed

We are in need of presentations for Wednesday October 23 meeting.  If you have an idea please contact @jbc22 or @jsherenco.


Tuesday, August 13, 2013

September meeting - Incident Titan

Join us as Jaron Bradley walks you through "Incident Titan" by demoing the following lessons strictly from a forensic host based analyst standpoint:
 
o   Pin pointing the attacker’s initial point of entry into company network
o   Analysis of Malware found on hard drive
o   Detecting lateral movement across network
o   Analysis of attacker techniques and methodologies
o   Detecting stolen data off a company network
o   Tracing attacker techniques through memory analysis