Uncategorized
Thursday, February 10th – 6:12pm @ Virtual
Hello Hackers!
This month we are joined by Eric, a hacker who stopped playing guitar for 25 years, and in that time learned a bit about computers and programming. Picking the guitar back up he ended up marrying the two and sharing his work with friends in a way that he controls the info being shared outside the walls of our sharing programs. From The Diary of a Madman:
Dear Diary.
This pandemic I relearned to play the guitar & share it on a low budget without giving my soul to a platform. Let me tell you some more about the process and project.
~eric
As usual these days of Covid, we will be meeting online at https://cafe.cyberia.club/dc612.
Talk starts at 6:12 PM U.S. Central, but feel free to hop in early and chat.
— TactiFail
Thursday, January 13th – 6:12pm @ Virtual
Hello Hackers, and happy 2022!
Hopefully everyone is staying safe, healthy, warm, and curious.
This month we are joined by Michael Goetzman, a long-time hacker with a hobby running CypherCon in Milwaukee, Wisconsin:
Like Hacking, Ciphers, and Community engagement? Discover the origin stories and secrets of Wisconsin’s largest security conference CypherCon. We’ll dive into fascinating discussions about our midwestern community building innovative projects. Get a taste for what is to come with ‘never before seen’ retro simulated puzzle operating systems “Cypher Forest”, Virtual Reality, and more. We’ll end with a discussion on where we think the midwest hacker community is going in the next decade.
As usual these days of Covid, we will be meeting online at https://cafe.cyberia.club/dc612.
Talk starts at 6:12 PM U.S. Central, but feel free to hop in early and chat.
— TactiFail
Thursday, December 9th – 6:12pm @ Virtual
Hello Hackers!
Apologies for the late post, but we are excited to be joined by Kyler Middleton for this last meeting of the year:
Come learn how a large healthcare company converted their static CI/CD builders from static VMs to ephemeral docker builders that are deployed via terraform into both Azure and AWS.
Kyler Middleton (she/they) has been building and repairing computers since she found out the farmers around her childhood ranch would trade brownies for computer support. She is self-taught, and has worked throughout most of the IT spectrum, from building a call center for 200+ agents, managing networks and security for ~100 vet clinics, to securing health care data in the cloud. Middleton is a PluralSight author, and owns her own consulting firm, helping secure and connect American manufacturing. She is a strong advocate for making DevOps and security approachable. She works at IAM Pulse to help engineers with cloud IAM issues, and to help shape the industry around cloud security.
As usual these days of Covid, we will be meeting online at https://cafe.cyberia.club/dc612. See you there!
— TactiFail
Thursday, November 11th – 6:12pm @ Virtual
This month we have a special guest from our neighbors over at 613, who is here to talk about getting into Reverse Engineering!

All Software is Open Source: An Introduction to Reverse Engineering
Commercial software is full of dark secrets – embedded keys and passwords, hidden backdoors, security vulnerabilities… But with companies guarding proprietary source code, is there any hope of discovering and rectifying them?
Enter Reverse Engineering. With its powerful tools and techniques, you can analyze any closed-source software, and have fun doing it!
Dmitriy Beryoza
He/Him – Senior Security Researcher – Vectra AI
Dmitriy is a Senior Security Researcher at Vectra AI. Before that he was a pentester and secure software development advocate at IBM. He spent over 25 years of his life building software before realizing that breaking it is much more fun. Dmitriy is passionate about all things security, with particular interest in reverse engineering, binary exploitation, secure software development, and CTF competitions.
As usual these days of Covid, we will be meeting online at https://cafe.cyberia.club/dc612.
-kat
Thursday, October 14th – 6:12pm @ Virtual
Happy Spooky Season to you and yours!
We're gathering at the same bat time, same bat channel this October, welcoming a returning champion and DEFCON chapter founder, @videoman!!
He's done a number of projects with hardware hacking the last year, and wants to share some of the fun things that he was able to accomplish, including buffer over flows on serial, MDNS overflows in embedded systems, and other fun topics in embedded hardware. He'll also do a quick intro on some of the basic tools that help a lot to debug, and great embedded devices.
David M. N. Bryan is a penetration tester with X-Force Red, IBM’s elite security testing team. Responsibilities include establishing standardized tools and processes for our consultants and working with clients on penetration testing projects. David has well over a decade of experience. From being a defender of security at a top ten banks, to securing the DEF CON network. David has been a participant in the information security community for over two decades. David has been the attacker in many scenarios as a penetration tester covering: ATMs, embedded devices, network, wireless, web applications, and physical security. David has presented at many security conferences including: BlackHat, DEF CON, ToorCon, LayerOne, ToorCamp, BSides Events, AppSecUSA, Etc.
As usual these days of Covid, we will be meeting online at https://cafe.cyberia.club/dc612
-kat