No December SecKC Meeting

 

Eventbrite - SecKC | 2016

Bug Drive to Help The Needy

Location: Meet in #BugDrive in Slack

Date: December 12th, 2017 - 6:00pm

 

Why are we doing this?

Attackers are working at scale, so why aren't defenders? Not everyone can afford their own security team, and even those who can sometimes let critical bugs slip through. This is an opportunity to use your skill to give back and help out Kansas City.

 

How to Participate

  • A list of IPs for the Kansas City region will be provided on 12/1.
  • Your goal is to identify bugs in the Kansas City region, and report them. This will help us know what the landscape looks like in Kansas City, and also help secure Kansas City.
  • We will review the results in our January 9th SecKC meeting. IP and host information will be anonymized for any identified bugs.
  • Be creative. Think of how you can help put your skills to work to help Kansas City.

 

Examples of Activities

  • Pick a service (HTTP, SMB, FTP, VNC, telnet) and browse for interesting services.
  • Pick a specific IP block and look thoroughly through it.
  • Passively analyze a company via google, shodan, censys, etc.
  • Browse all HTTP servers looking for interesting services.
  • Use server version fingerprints for significant vulnerabilities.
  • Identify botnet or spam IPs in the area, and report them to the system owner or their ISP.

 

Rules of Participation

  • Only communicate with services using normal means. Do not send any "attacks". For example, curl and FireFox are okay to communicate with website. Nikto and Nessus are not.
  • Do not run vulnerability identification tool unless you understanding what it is doing.
  • Testing is recommended to be performed from the SecKC VPN.
  • It is important that we are only identifying vulnerabilities and not exploiting them. Often you need to exploit a bug to validate it. If this is the case, we will not be able to validate it.
  • No legal protection is provided by participating. Any illegal activities are still illegal.

 

January's SecKC Meeting

WHEN: Tuesday, January 9th, 2018 from 6:00 PM to 9:30 PM (CST)
WHERE: Kanza Hall - 7300 W 119th St. Overland Park, KS 66213

6:00-6:25 -* SecKC 101 — Welcome to SecKC & - SecKC Open Source Intel Briefing

 

6:30-7:00 - Why (and how) we phish our users and why you should too

Julie Fugett & Shane Fonyi

After a phishing incident that resulted in direct deposit theft, we realized we needed to take a more aggressive approach to educating our users about social engineering and phishing. With the expenditure of some political capital and a cash outlay of less than $10, here's how and why we did it.

 

7:05-7:50 - Hardware Hacking: Basic Intro to Oscilloscoping

rsaxvc [rsaxvc.net]

Learn the basics of examining circuit boards, identifying bus voltage, serial format, and baud rate with a oscilloscope hooked up to the SecKC projector.

We'll start with care and feeding, then look at some synthetic signals, then move on to identifying a serial port on an embedded Linux computer, figuring out it's pinout and baud rate, then connecting to it.

 

8:00-8:40 - Attacking Active D - A Hacking Series pt.2

Ryan Preston

The second in a series of talks explaining and demonstrating modern attacks on Active Directory. During this presentation I will further cover Bloodhound and various other tools used in the reconnaissance phase of pentesting Active Directory.

 

February's SecKC Meeting

WHEN: Tuesday, February 13th, 2018 from 6:00 PM to 9:30 PM (CST)
WHERE: Kanza Hall - 7300 W 119th St. Overland Park, KS 66213

6:00-6:25 -* SecKC 101 — Welcome to SecKC & - SecKC Open Source Intel Briefing

 

6:30-6:55 - How to make them care: Communicating successfully with executives

Caleb Christopher

Why do executives always shoot down your proposal? You've chosen the best solution for a given problem or gap...
Learn about how to transform not only your presentation style, but to rethink your approach to choosing solutions so you will be more likely get a positive response. It may seem less glamorous, but it sure is more satisfying.
(Just the) pro tip: They don't care about the features--they're running a business, not a tech fair showcase.

 

7:00-7:35 - Mimikatz: I can has pazzwords?

Dusty Evanoff

This is an introduction to Mimikatz for the uninitiated. I'll show you how to steal Windows passwords (and other secrets) like a boss as well as how to bypass common defenses. Then, we'll discuss how to minimize the damage caused by credential theft, and talk about how you can detect it on your own network.

 

7:45-8:30 - Intermediate Reverse Engineering Lesson: FLARE-ON IgniteMe.exe

Archwisp / Bryan C. Geraghty

You saw Cory's 101 talk on reversing (https://www.youtube.com/watch?v=Fr7xC8_FHgs) and you wanted to learn more. So you picked up some books poked around a bit at some CTFs but still don't really understand what's going on. Well, that's about to change.

In this talk, we're going to walk through how to solve the FLARE-ON CTF: IgniteMe reverse engineering challenge from September of 2017. Ultimately, you will learn the solution to the challenge, but the real goal of this talk is to teach you the background, techniques, and tools you would need to know in order to solve a challenge like this. This is going to be a really deep technical dive but we'll make sure to have lots of fun along the way!

Eventbrite - SecKC | 2016

Twitter