This month we have two minor updates to get out of the way before we get to our speaker:
- The name of the venue apparently changed from “Wilde Roast Cafe” to just “Wilde Cafe” somewhat recently so we’re changing the post titles and details accordingly. Hopefully this helps clear up any confusion as to where we actually meet 🙂
- At our last meeting we were asked the age-old question of “When does DC612 actually start?” and I gave the age-old answer of “Some time between 6 and 6:30 but it really depends on traffic and weather.” Someone suggested we start at 6:12 and dammit that’s just what we’re going to do going forward.
That’s it for the updates, now onto the speaker!
Some of you who have been around for a while might remember Spenser Reinhardt AKA @c0mmiebstrd. He was a regular of DC612 until he moved out of state for work, but he’s back visiting this month and will be giving us an overview of the radare2 reversing framework. In his own words:
Radare2 is a free suite of tools for reversing, exploit development, binary diffing and all sorts of things! This month Spenser will take us through a Trail of Bits CTF challenge using r2 and python. If you’d like to follow along, you’ll need a Kali Linux 2019 system or virtual machine, and the files from here: https://github.com/sreinhardt/CTF-Beginners-Guide
I’m excited to have him back, and the subject matter doesn’t hurt matters either – see you all there!
Where: Wilde Cafe – 65 Main St SE, Mpls.
When: Thursday, June 13th 6:12PM
This month, DC612 founder David Bryan (VideoMan) will be giving a preview of his upcoming Thotcon talk titled “Goldilocks and the three ATM attacks”. The abstract reads as follows:
Automated Teller Machines (ATM) attacks are more sophisticated than ever before. Criminals have upped their game, compromising and manipulating ATM networks, software and other connected infrastructure. Between having a third-party manage these machines, and ATMs deployed on low-bandwidth links, it’s an inevitable wild-west environment. In this talk I will review three case studies of ATM attacks, showing how they have become more dangerous than ever before. In this session, I will discuss unknown ATM flaws our pentesting team has uncovered while performing testing, the various ways criminals are attacking ATMs, the many security problems that we have identified with ATM systems, and what can be done to prevent these attacks. I will review three case studies of ATMs. One where the ATM security was extremely poor; One where the security was very good but the ATM still fell victim to an attack because we discovered a zero-day in the management software; And one where the security was just right- but its specific deployment had some major flaws that ultimately led to an ATM compromise. In this last case, the attackers side-loaded an application, and were able to run a criminal ring that led to $7M USD in losses.
Exciting stuff – hope to see you all there!
Where: Wilde Roast Cafe – 65 Main St SE, Mpls.
When: Thursday, May 9th 6PM
We are back on for April!
DC612 is back on an irregular night (third Monday) but at our regular location (Wilde Roast). Minnesota tried its best to keep us away, but we persisted!
This month we get Blue, with POWER-RESPONSE!
— TactiFail (Original post by Kat)
Update: Unfortunately with the coming storm we have decided to cancel the April meeting. We may reschedule if it works out for our speakers (and the weather), so keep an eye on this channel for more.
Annnnnnd, We’re Back!
DC612 is back on our regular night (Second Thursday) and at our regular location (Wilde Roast).
This month we get Blue, with POWER-RESPONSE !
We are happy to announce a SECOND meeting this March – that’s two for the price of none!
Josh More, frequent speaker and resident intern wrangler will be wrangling interns this month. He has invited them to meet with DC612 folk and learn what it is like to work in security. It will be a pretty relaxed session, general Q&A sort of thing, open mic. Feel free to join us and discuss the day-to-day of working in the security field, whether you are on the blue team, the red team, the orange team, Team Edward, Ravenclaw, Next Generation,
or even emacs.
See you all there!