Thursday, November 11th – 6:12pm @ Virtual

Written by  on November 7, 2021

This month we have a special guest from our neighbors over at 613, who is here to talk about getting into Reverse Engineering!

All Software is Open Source: An Introduction to Reverse Engineering

Commercial software is full of dark secrets – embedded keys and passwords, hidden backdoors, security vulnerabilities… But with companies guarding proprietary source code, is there any hope of discovering and rectifying them?

Enter Reverse Engineering. With its powerful tools and techniques, you can analyze any closed-source software, and have fun doing it!

Dmitriy Beryoza

He/Him – Senior Security Researcher – Vectra AI
Dmitriy is a Senior Security Researcher at Vectra AI. Before that he was a pentester and secure software development advocate at IBM. He spent over 25 years of his life building software before realizing that breaking it is much more fun. Dmitriy is passionate about all things security, with particular interest in reverse engineering, binary exploitation, secure software development, and CTF competitions.

As usual these days of Covid, we will be meeting online at


Thursday, October 14th – 6:12pm @ Virtual

Written by  on October 10, 2021
Happy Spooky Season to you and yours!
We're gathering at the same bat time, same bat channel this October, welcoming a returning champion and DEFCON chapter founder, @videoman!!
He's done a number of projects with hardware hacking the last year, and wants to share some of the fun things that he was able to accomplish, including buffer over flows on serial, MDNS overflows in embedded systems, and other fun topics in embedded hardware. He'll also do a quick intro on some of the basic tools that help a lot to debug, and great embedded devices.

David M. N. Bryan is a penetration tester with X-Force Red, IBM’s elite security testing team. Responsibilities include establishing standardized tools and processes for our consultants and working with clients on penetration testing projects. David has well over a decade of experience. From being a defender of security at a top ten banks, to securing the DEF CON network. David has been a participant in the information security community for over two decades. David has been the attacker in many scenarios as a penetration tester covering: ATMs, embedded devices, network, wireless, web applications, and physical security. David has presented at many security conferences including: BlackHat, DEF CON, ToorCon, LayerOne, ToorCamp, BSides Events, AppSecUSA, Etc.
As usual these days of Covid, we will be meeting online at

Thursday, September 9th – 6:12pm @ Virtual

Written by  on September 6, 2021

Hello Hackers!

Hopefully everyone is recovered from DefCon last month, or just enjoyed some downtime. Either way, we are back to our regularly-scheduled hackery!

This month we are joined by Caleb Shingledecker, who is the co-founder and lead developer at the startup Becoming Machinic:

Caleb Shingledecker will provide an overview of constraints facing multi-cloud infrastructure in organizations, and outline a utility he’s been developing that utilizes Wireguard to orchestrate connections between nodes, regardless of locale or cloud vendor.

As usual these days of Covid, we will be meeting online at

— TactiFail

Thursday, July 8th – 6:12pm @ Virtual

Written by  on July 6, 2021

Hello hackers!

This month we are happy to have Jacen Kohler join us to speak a bit on physical ID forgery:

A common method of gaining legitimacy on social engineering is the “Appeal to Authority” technique. This involves preforming OSINT on your target and referencing a figure of authority. If you have a fake employee ID, you can take a step closer to becoming the authority. A forged badge can add a visual layer to your story helping target employees become more likely to see you as a legitimate entity. In this talk, I will be showing how to create simple forged IDs, share some tips that helped me in previous engagements, and give an overview of times when having a fake badge helped me achieve my goals set forth by the client.

Jacen R Kohler has been working in cyber security and information security for the last 6 years. He received his degree in Computer Engineering from the University of North Texas in Computer Engineering. His career in security consulting has taken him through many industries including finance, transportation, energy, and government.

As usual these days, we will be meeting online at

— TactiFail

DC612 ToxicBBQ – Saturday July 24th noon – 4pm @ Lauderdale Community Park

Written by  on June 6, 2021

IRL DC612, could it be true ?

While our meetings are staying virtual for the time being, we couldn’t pass up the chance to schedule a real life, in-person BBQ, ToxicBBQ – DC612 Edition.

For those unaware of the ToxicBBQ tradition, it’s simple. We provide the space, you show up with you favorite grill item to share. Folks are welcome to bring meat to brill, veg items, chips and anything that might be helpful or tasty. Recommendation for contributions are in the Google Doc. PLEASE tell us what you’re brining so we don’t end up with 800 hotdogs and no buns, okay?

Sign-up Sheet For Food, Beverages, Charcoal and Misc

We have the Picnic Shelter @ Lauderdale Community Park reserved for 4 hours, from noon – 4pm, thanks to long time attendee and friend of DC612, Josh. He had to brave city hall and government forms to get us this park shelter rental. When you see him, say THANKS!

Its been a long road,

getting from there to here,

It’s been a long time

But our time is finally near

Star Trek – Enterprise

2328 Roselawn Ave W, Lauderdale, MN 55113