This month we have two minor updates to get out of the way before we get to our speaker:
- The name of the venue apparently changed from “Wilde Roast Cafe” to just “Wilde Cafe” somewhat recently so we’re changing the post titles and details accordingly. Hopefully this helps clear up any confusion as to where we actually meet 🙂
- At our last meeting we were asked the age-old question of “When does DC612 actually start?” and I gave the age-old answer of “Some time between 6 and 6:30 but it really depends on traffic and weather.” Someone suggested we start at 6:12 and dammit that’s just what we’re going to do going forward.
That’s it for the updates, now onto the speaker!
Some of you who have been around for a while might remember Spenser Reinhardt AKA @c0mmiebstrd. He was a regular of DC612 until he moved out of state for work, but he’s back visiting this month and will be giving us an overview of the radare2 reversing framework. In his own words:
Radare2 is a free suite of tools for reversing, exploit development, binary diffing and all sorts of things! This month Spenser will take us through a Trail of Bits CTF challenge using r2 and python. If you’d like to follow along, you’ll need a Kali Linux 2019 system or virtual machine, and the files from here: https://github.com/sreinhardt/CTF-Beginners-Guide
I’m excited to have him back, and the subject matter doesn’t hurt matters either – see you all there!
Where: Wilde Cafe – 65 Main St SE, Mpls.
When: Thursday, June 13th 6:12PM
This month, DC612 founder David Bryan (VideoMan) will be giving a preview of his upcoming Thotcon talk titled “Goldilocks and the three ATM attacks”. The abstract reads as follows:
Automated Teller Machines (ATM) attacks are more sophisticated than ever before. Criminals have upped their game, compromising and manipulating ATM networks, software and other connected infrastructure. Between having a third-party manage these machines, and ATMs deployed on low-bandwidth links, it’s an inevitable wild-west environment. In this talk I will review three case studies of ATM attacks, showing how they have become more dangerous than ever before. In this session, I will discuss unknown ATM flaws our pentesting team has uncovered while performing testing, the various ways criminals are attacking ATMs, the many security problems that we have identified with ATM systems, and what can be done to prevent these attacks. I will review three case studies of ATMs. One where the ATM security was extremely poor; One where the security was very good but the ATM still fell victim to an attack because we discovered a zero-day in the management software; And one where the security was just right- but its specific deployment had some major flaws that ultimately led to an ATM compromise. In this last case, the attackers side-loaded an application, and were able to run a criminal ring that led to $7M USD in losses.
Exciting stuff – hope to see you all there!
Where: Wilde Roast Cafe – 65 Main St SE, Mpls.
When: Thursday, May 9th 6PM