jaredbird

Payload from balloon launch found!!

Written by  on June 8, 2013

The payload from the balloon launch last October was found on June 1st. A guy in Wisconsin was hunting on his property when he spotted the styrofoam cooler. It was found at approximately 45.175661,-92.034424. He called my cell number which had been attached to the side of the cooler. He said it “stuck out like a sore thumb in the trees.” He also said the payload and equipment inside was “destroyed”, but was able to retrieve the SD card from the camera and mailed it to me. The full length unedited video can be found at http://www.youtube.com/watch?v=o_JOcD3BYKM. We learned several good lessons including using a better cell phone carrier to track the payload and as seen in the video, better stabilizers are needed for the next attempt. I suppose it would also be a good idea to wait for a clear day next time around….

– Jared

June 13th Meeting 6pm @ Elsies

Written by  on June 7, 2013

For the June DC612 meeting, Spenser Reinhardt will be presenting on Beginning Exploitation with Manual Exploits.

 Description:
An introduction to simple exploits in an unprotected operating system. He will describe, how and why these issues are still present today, and how to start working with them. You will look at simple code, compile and debug a program or two, create some shellcode and use it to exploit an application. The aim being, to give a brief but detailed overview of how exploits work and how to begin creating your own shellcode.
Necessary tools:
Linux based OS (Suggested in a virtual machine)
gcc – GNU C Compiler
gdb – GNU Debugger
nasm – Netwide Assembler, a common assembly compiler for x86
xxd or hexedit – Generic hex editors
vim or nano – text editor

Agenda:

6:00PM-6:30PM – Get in, get drinks and food ordered

6:30PM-???? – Spenser Reinhardt

Elsie’s Restaurant Bar and Bowling
729 MarshallStreet N.E.,
Minneapolis, MN 55413

May 9th Meeting 6pm @ Elsies

Written by  on April 28, 2013

For the May DC612 meeting, Paul Dokas will be presenting on the new Dragon Research Group (DRG) pod distro. The Dragon Research Group (DRG) is a volunteer group of security researchers that collect and freely distribute intelligence regarding malicious behavior seen online.  One of the key platforms used to collect and analyze this data is the DRG pod which is a passive sensor built using NanoBSD (a slimmed down version of FreeBSD).  This talk will cover the design goals, system layout, build system and future directions for the pods.

Bio: Paul Dokas is an IT security professional with 20+ years of experience in the IT industry as an IT security architect and analyst, programmer, and system administrator.  Currently working in the Twin Cities as an senior IT security analyst he is expanding his passion for intrusion detection, data analysis and incident response.  In off hours, he volunteers with the DRG and is building a network intrusion sensor and analysis framework (soon to be released as open source).

Agenda:

6:00PM-6:30PM – Get in, get drinks and food ordered

6:30PM-???? – Paul Dokas

Elsie’s Restaurant Bar and Bowling
729 MarshallStreet N.E.,
Minneapolis, MN 55413

No April DC612 Meeting

Written by  on April 9, 2013

We are not going to have an April DC612 meeting as we didn’t receive any volunteers to present on a topic this month. If you have a topic you would like to present on at a future DC612 or are working on a project that you would like to solicit some feedback on, please email us at info – at – dc612.org.

Also, don’t forget about the Minne-Faire happening THIS WEEKEND at The Hack Factory! More info can be found here: http://minnefaire.org/

Thanks

-DC612

No February Meeting

Written by  on February 12, 2013

We are not going to have a February meeting. Stay home, stay warm, and enjoy Valentines Day. We will see you in March for the badge hacking night (details below):

Let’s hack some DEF CON XX badges!

DC612 is holding a badge hacking workshop!  Wanna have fun and setup a commodore 64 emulator on your Defcon XX badge!  Now is the time!  DEF CON donated 30 extra badges (CDs and Programs too!).  Their only request was that we post (Blog, Social Media, Office Xerox, etc) about your project or board when we complete it.

We are asking $5-$10, but you can always add more, as the donation goes directly to the Hack Factory.  Each ticket comes with a badge.  You will need to pay cash for the badge when you arrive, as we get chraged $1 for each ticket we sell via eventbrite. We’ve also setup individual badge tickets.  So say you wanted a Human badge- design #1, well you can use that as your ticket and we will make sure you get that badge.

These were donated by DEF CON for us to play with.  To order more and check out the designs, visit: http://hackerstickers.com/product/hardware-dc20-humanbadge/

– DC612