Sudo this: For the Thursday 6/15 DC970 meeting, we are going to dive into some best practice and thoughts for hardening for Linux systems. Bring ideas, lessons learned, experience, and questions!
It’s been several months since your investigation of Hackme Corp uncovered some very useful data. The entire IT staff has been replaced since Sarge’s departure from Hackme Corp, but aren’t as skilled or as experienced as the last team. With none of the existing team to train the new folks, the ramping up period has… Read More »
Summary: Since you last performed work for Hackme Corp, their little company has been through rough times. The latest of which started when they hired the militant John Pepper to be their system admin. Those who respected John’s stern demeanor and unorthodox methods simply called him Sarge, firstly because he was once a drill sergeant… Read More »
Tonight we will be discussing various web application testing methodologies, vulnerabilities, and exploits. We will go over browser plugins, tools, as well as manual processes for identifying and exploiting vulnerabilities in web applications. Bring a Kali/Linux box/VM to practice and hone your techniques.
We will be hosting another CTF this Thursday, September 15, at the Wild Boar. This CTF will be hosted on a Raspberry Pi and should be fun for all skill levels. A wireless and wired network will be setup to connect to. You may want to have access to the internet to lookup things, but… Read More »
This Thursday, the ones that made it to Defcon this year, will be doing a debrief for the rest of the group. We will go over the talks/presentations, CTFs, CGC, lessons learned, and thoughts for the next one. Also discuss upcoming Bsides Denver and other conferences.
Come join us for a fun little CTF this Thursday. Stickybits has create a great CTF challenge that is perfect for someone who has never participated in a CTF (Capture The Flag) event before. There are 3 flags to be found on the fictitious Hackme Corp’s network and systems. There is also a bonus flag… Read More »
For those who attended the 10th Annual Rocky Mountain Information Security Conference in Denver last week, there will be a debrief of their experiences. We will discuss thoughts about the breakout sessions as well as the 8 hour pentest workshop that was taken with Georgia Weidman herself. We will go over the simulated pentest and… Read More »