Thursday, January 13th – 6:12pm @ Virtual

Written by  on January 10, 2022

Hello Hackers, and happy 2022!

Hopefully everyone is staying safe, healthy, warm, and curious.

This month we are joined by Michael Goetzman, a long-time hacker with a hobby running CypherCon in Milwaukee, Wisconsin:

Like Hacking, Ciphers, and Community engagement? Discover the origin stories and secrets of Wisconsin’s largest security conference CypherCon. We’ll dive into fascinating discussions about our midwestern community building innovative projects. Get a taste for what is to come with ‘never before seen’ retro simulated puzzle operating systems “Cypher Forest”, Virtual Reality, and more. We’ll end with a discussion on where we think the midwest hacker community is going in the next decade.

As usual these days of Covid, we will be meeting online at

Talk starts at 6:12 PM U.S. Central, but feel free to hop in early and chat.

— TactiFail

Thursday, December 9th – 6:12pm @ Virtual

Written by  on December 6, 2021

Hello Hackers!

Apologies for the late post, but we are excited to be joined by Kyler Middleton for this last meeting of the year:

Come learn how a large healthcare company converted their static CI/CD builders from static VMs to ephemeral docker builders that are deployed via terraform into both Azure and AWS.

Kyler Middleton (she/they) has been building and repairing computers since she found out the farmers around her childhood ranch would trade brownies for computer support. She is self-taught, and has worked throughout most of the IT spectrum, from building a call center for 200+ agents, managing networks and security for ~100 vet clinics, to securing health care data in the cloud. Middleton is a PluralSight author, and owns her own consulting firm, helping secure and connect American manufacturing. She is a strong advocate for making DevOps and security approachable. She works at IAM Pulse to help engineers with cloud IAM issues, and to help shape the industry around cloud security.

As usual these days of Covid, we will be meeting online at See you there!

— TactiFail

Thursday, November 11th – 6:12pm @ Virtual

Written by  on November 7, 2021

This month we have a special guest from our neighbors over at 613, who is here to talk about getting into Reverse Engineering!

All Software is Open Source: An Introduction to Reverse Engineering

Commercial software is full of dark secrets – embedded keys and passwords, hidden backdoors, security vulnerabilities… But with companies guarding proprietary source code, is there any hope of discovering and rectifying them?

Enter Reverse Engineering. With its powerful tools and techniques, you can analyze any closed-source software, and have fun doing it!

Dmitriy Beryoza

He/Him – Senior Security Researcher – Vectra AI
Dmitriy is a Senior Security Researcher at Vectra AI. Before that he was a pentester and secure software development advocate at IBM. He spent over 25 years of his life building software before realizing that breaking it is much more fun. Dmitriy is passionate about all things security, with particular interest in reverse engineering, binary exploitation, secure software development, and CTF competitions.

As usual these days of Covid, we will be meeting online at


Thursday, October 14th – 6:12pm @ Virtual

Written by  on October 10, 2021
Happy Spooky Season to you and yours!
We're gathering at the same bat time, same bat channel this October, welcoming a returning champion and DEFCON chapter founder, @videoman!!
He's done a number of projects with hardware hacking the last year, and wants to share some of the fun things that he was able to accomplish, including buffer over flows on serial, MDNS overflows in embedded systems, and other fun topics in embedded hardware. He'll also do a quick intro on some of the basic tools that help a lot to debug, and great embedded devices.

David M. N. Bryan is a penetration tester with X-Force Red, IBM’s elite security testing team. Responsibilities include establishing standardized tools and processes for our consultants and working with clients on penetration testing projects. David has well over a decade of experience. From being a defender of security at a top ten banks, to securing the DEF CON network. David has been a participant in the information security community for over two decades. David has been the attacker in many scenarios as a penetration tester covering: ATMs, embedded devices, network, wireless, web applications, and physical security. David has presented at many security conferences including: BlackHat, DEF CON, ToorCon, LayerOne, ToorCamp, BSides Events, AppSecUSA, Etc.
As usual these days of Covid, we will be meeting online at

Thursday, September 9th – 6:12pm @ Virtual

Written by  on September 6, 2021

Hello Hackers!

Hopefully everyone is recovered from DefCon last month, or just enjoyed some downtime. Either way, we are back to our regularly-scheduled hackery!

This month we are joined by Caleb Shingledecker, who is the co-founder and lead developer at the startup Becoming Machinic:

Caleb Shingledecker will provide an overview of constraints facing multi-cloud infrastructure in organizations, and outline a utility he’s been developing that utilizes Wireguard to orchestrate connections between nodes, regardless of locale or cloud vendor.

As usual these days of Covid, we will be meeting online at

— TactiFail