Uncategorized
Thursday November 9th, 6pm @ Wilde Cafe
Hello Hackers!
It’s November, and that means… well, cold. It means cold.
This month we are bringing back crowd favorite and regular DC612 attendee, Josh More!
Josh is perhaps best known at DC612 for his talks on photography, anonymity, and how to give a good presentation (hint hint). This month he will be addressing the power of metaphor in IT:
There is a divide between the so-called “security/technical” people and the “business” people. We’ve all heard about how we need to “speak the language of business” and “get soft skills” to succeed. However, even after decades of trying, the divide still exists. Why does it seem that we never make progress? Are we truly not improving? Is the goal receding as we chase it? This presentation posits that we’ve been making a fundamental error in trying to explain things to people outside our field. One thing that people-oriented people do naturally and technically-oriented people do not is communicate with others using the target’s metaphors. By taking this approach and translating issues into different frames of reference, more time is spent exploring the issue instead of arguing over why it matters.
As always, please bring a healthy appetite for both knowledge and food. See you there!
Thursday October 12th, 6pm @ WildeRoast – DFIR Month
Hello Hackers!
It’s October, and that means it is DFIR Month at DC612!
What is DFIR you ask? It’s pronounced “dee-fur” and it is not the same as shaving a fuzzy animal. DFIR stands for Digital Forensics and Incident Response, and it is the realm of investigating breaches, reacting to them to minimize immediate damage, and ensuring the proper information is gathered to help prevent them in the future.
As with other DC612 Projects months, the talks this time around will be shorter, but there will be more of them.
So bring your favorite hex editor, and prepare for a night of forensic fun!
— TactiFail
Thursday September 14th, 6pm @ WildeRoast – Crypto Month
Hello Hackers!
It’s September, and that means it is Crypto Month at DC612!
At the beginning of the year we announced DC612 Projects:
In the Month of February, DC612 will be opening a new program in which YOU are encouraged to sign up for and research a topic of your choosing.
Then, turn your Project into a 20 minute talk that you bring back to the group and present along with others in your category
Just like the Web Security and Recon nights, there will be multiple, shorter talks for the Crypto meeting. Keep an eye on this list as we get confirmation on who all is speaking:
- @NightmareJS will be going over the new Firefox Send project, with a demo
- Our resident kilt-wearing Crypto fanatic @Crypty McCryptoFace may make an appearance
- I’ve heard rumors that Tony may have some words of wisdom to share
If you will be speaking but your name is not on this list, hit us up on the Twitters, Slack, or by emailing info@dc612.org and we’ll get your info up.
See you there!
DC612 – Thursday August 10th, 6pm @ WildeRoast
We made it to August ladies and gentlemen!
I trust we all made it back from Hacker summer camp safe and sound.
Traditionally we have taken August off at DC612 to rest and recoup. However, this year we’re trying something new.
Join us this Thursday at the usual time, at the usual place for an old fashion Hacker Dinner Party.
No speaker – No agenda – Come as you are as always.
DC612 – Thursday July 13th, 6pm @ WildeRoast
Its Web Security month at DC612!
In celebration of Web (in)Security, we are welcoming a special guest, Damodar Chetty. He will be talking to us about the importance of Application Security and a popular OWASP tool used to test applications, ZAP!
Web Application Vulnerability Testing with OWASP’s ZAP and Webgoat
OWASP’s ZAP is an amazingly full featured web hacking toolkit – combining an intercepting proxy with HTTPS support, spidering, as well as passive and active vulnerability scanning capabilities. It also has a great pedigree – it is a flagship project of the Open Web Application Security Project (OWASP) and started life as a fork of the Paros proxy. And the best part is that unlike its competition, ZAP is completely free! All this results in a package that provides an easy entry into the world of web application vulnerability testing. In this hour, we’ll consider how to leverage the features of this interesting tool against an intentionally vulnerable web application – OWASP’s WebGoat. In the process, we’ll also discuss some common web application vulnerabilities, including Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).
Presenter Details
Damodar is an educator, software engineer and life-long student who has spent the last three decades architecting and building software systems in a wide variety of technologies. He has worked for Ameriprise, Best Buy, US Bank, Thomson Reuters, Pearson Vue and the Federal Reserve Bank of Minneapolis, and is currently a Principal Architect for Wealth Management at US Bank. He is the author of “Tomcat 6 — A Developer’s Guide” and was a technical editor for the Third Edition of Core JavaServer Faces (Geary, Horstmann). He satisfies his passion for education by teaching at Metropolitan State University in St Paul and providing corporate training.
Additional Jabber
If you are planning to come to the War Driving event on 7/15, come by on the 13th to get some of your burning questions answered!
And we should probably talk about a 612 get together at DEF CON.