Payload from balloon launch found!!

Written by  on June 8, 2013

The payload from the balloon launch last October was found on June 1st. A guy in Wisconsin was hunting on his property when he spotted the styrofoam cooler. It was found at approximately 45.175661,-92.034424. He called my cell number which had been attached to the side of the cooler. He said it “stuck out like a sore thumb in the trees.” He also said the payload and equipment inside was “destroyed”, but was able to retrieve the SD card from the camera and mailed it to me. The full length unedited video can be found at We learned several good lessons including using a better cell phone carrier to track the payload and as seen in the video, better stabilizers are needed for the next attempt. I suppose it would also be a good idea to wait for a clear day next time around….

– Jared

June 13th Meeting 6pm @ Elsies

Written by  on June 7, 2013

For the June DC612 meeting, Spenser Reinhardt will be presenting on Beginning Exploitation with Manual Exploits.

An introduction to simple exploits in an unprotected operating system. He will describe, how and why these issues are still present today, and how to start working with them. You will look at simple code, compile and debug a program or two, create some shellcode and use it to exploit an application. The aim being, to give a brief but detailed overview of how exploits work and how to begin creating your own shellcode.
Necessary tools:
Linux based OS (Suggested in a virtual machine)
gcc – GNU C Compiler
gdb – GNU Debugger
nasm – Netwide Assembler, a common assembly compiler for x86
xxd or hexedit – Generic hex editors
vim or nano – text editor


6:00PM-6:30PM – Get in, get drinks and food ordered

6:30PM-???? – Spenser Reinhardt

Elsie’s Restaurant Bar and Bowling
729 MarshallStreet N.E.,
Minneapolis, MN 55413