- Virtual Hacking Workshop
This virtual hands-on hacking workshop is a virtual networking event to bring the local community together. Hang out, share your latest cybersecurity projects, goals, and get insights from other professionals in the field. The agenda is completely open-ended for this workshop, the participants will drive the conversation and content. What to do during the workshop? Participate in the PAHackers Capture the Flag platform, share your work/research with others, and get answers to some of those pressing cybersecurity questions. Space for this virtual event is limited to 100 participants! Zoom Details: Join Zoom Meeting https://zoom.us/j/8574946718 One tap mobile [masked],,[masked]# US (New York) [masked],,[masked]# US Dial by your location [masked] US (New York) [masked] US Meeting ID:[masked] Find your local number: https://zoom.us/u/aeHDnCzwKz
- Learning Web App Hacking with Webgoat and Security Shepherd
After the success of our last CTF we wanted to do a series of workshops based around Web Application Security. This will be the first in this series of workshops, this workshop will focus on OWASP Web Goat and Security Shepherd as learning tools to hone your web application hacking tools. There will be a short presentation and introduction to OWASP Security Shepherd and OWASP WebGoat. For this meetup, it is recommended to BRING A LAPTOP Pre-Meetup checklist: 1. Download OWASP Webgoat at https://github.com/WebGoat/WebGoat/releases Make sure to download version M21, that one is compatible with the default Java download in Windows and Kali Linux. 2. Download and install virtual box at https://www.virtualbox.org/ 3. Download and install security Shepherd Virtual Machine from the official github repo https://github.com/OWASP/SecurityShepherd It is also advised that everyone keeps their RSVP up to date out of respect for those on the waitlist. If you are a no-show, it will be tracked and may prevent you from attending future events. If you have questions, join the PAHackers slack channel: https://join.slack.com/t/pahackers/shared_invite/enQtNDYwOTk5NTc2OTc4LTZlM2ZhMGQ2NTQ5M2FmZjM4ZjZmOTRiNjRjYjI4YmI4Yzk5ZjU3Nzc3YTQ1NTczNDcwOWQzMjQ5ZDUyYjczODA Thank you! This meeting or program is not sponsored or endorsed by the Joseph T. Simpson Public Library. The library does not endorse the view or opinions of the speakers and groups utilizing the library’s meeting room.
- Introduction to CTF(Capture the Flag) competitions
Have you ever wondered what the deal is with all these CTF events? This is your chance to learn all about capture the flag competitions and how they can make you a better cybersecurity professional and ethical hacker. In this introductory class, we will review what a CTF is, the purpose, and how you can use it to advance your career. We will also unveil the PAHackers CTF platform that will allow our members to participate in our own group CTF. This event is limited to 26 participants so register before it is too late! For this meetup, it is recommended to BRING A LAPTOP and any web hacking tools you may want to utilize during the meetup. We will all be creating our own instances of Juice Shop https://github.com/bkimminich/juice-shop using Heroku so it is recommended you have a free account set up ahead of time. Downloading OWASP ZAP or Burp Suite will definitely give an advantage during the competition. Pre-Meetup checklist: 1. Create heroku account (https://www.heroku.com/). 2. Go to https://github.com/bkimminich/juice-shop and deploy Juice Shop on your new heroku account (see image above). It is also advised that everyone keeps their RSVP up to date out of respect for those on the waitlist. If you are a no-show, it will be tracked and may prevent you from attending future events. If you have questions, join the PAHackers slack channel: https://join.slack.com/t/pahackers/shared_invite/enQtNDYwOTk5NTc2OTc4LTZlM2ZhMGQ2NTQ5M2FmZjM4ZjZmOTRiNjRjYjI4YmI4Yzk5ZjU3Nzc3YTQ1NTczNDcwOWQzMjQ5ZDUyYjczODA Thank you! This meeting or program is not sponsored or endorsed by the Joseph T. Simpson Public Library. The library does not endorse the view or opinions of the speakers and groups utilizing the library’s meeting room.
- Introduction to Python for Security Professionals Webinar part 1
Ready to jump into the fascinating world of programming by learning Python? Interested in Cyber Security and how you can use Python to help in offensive and defensive security measures? This is the webinar for you! We will explore the Python basics in this webinar and follow up with some examples of Python scripts that can be used for Penetration Testing Exercises! What is Python? Why Python Hello World! Fun with variables! If this then that! Looping Fun! Functions, Functions everywhere! Modules Python Scripting for Security Offensive Python What's Next? To attend meetup simply join the scheduled Zoom meeting below: Brandon Keath is inviting you to a scheduled Zoom meeting. Topic: Introduction to Python for Security Time: Dec 21,[masked]:30 PM Eastern Time (US and Canada) Join Zoom Meeting https://zoom.us/j/961594693 One tap mobile [masked],,[masked]# US (New York) [masked],,[masked]# US Dial by your location [masked] US (New York) [masked] US Meeting ID:[masked] Find your local number: https://zoom.us/u/abFvQgrA3Q
- Malware Analysis 101
What we’ll do - Introductions (5 min) - Presentation (90min) Creating Linux and Windows virtual environments to observe and analyze data. Virtualization software Linux Distributions Windows distributions Configuring the virtual machine Obtaining malware for Analysis Creating MD5 Hash for malware Performing Static Analysis ClamAV Using google and the MD5 hash for information gathering String Analysis PEiD (packer, cryptos, and compiler detection tool) PEview Resource Hacker (resource compiler and decompiler) Performing Dynamic Analysis REMnux Networking windows and REMnux for dynamic analysis Inetsim Network Traffic Inspection with Wireshark Sysinternal Suite Process Explorer Autoruns TCPView - Q&A - Networking and Wrap Up (30 min) Speaker Bio: Joel Prentice Systems Administrator with Eurofins where I ensure the data integrity laboratory data in accordance with 21 CFR Part 11 compliance. Associates Degree in Information Security from University of Phoenix Bachelor’s Degree in Cyber security operations from Utica College Cyber Security Enthusiast
- Web Hacking 101
*Date and venue locked in!* Sponsors: Free Food provided by Appalachia!!! Venue provided by Select Medical! In this fast-paced presentation, we will be focusing specifically on web application hacking, we will quickly review what it means to be an ethical hacker and dive into common web application hacking tools including: OWASP ZAP Burp Suite Nikto Skipfish and more including talking about developing your own scanners and scripts in Python We will talk about the OWASP Testing Framework alongside the OWASP Top 10 and how you can begin learning how to detect web application vulnerabilities. There will be a discussion on Capture the Flag exercises and how to start your journey as a bug bounty hunter. This will be a high-level presentation with many practical examples and will set the stage for more targeted sessions that will delve deeper into these tools and techniques! Speaker: Brandon S. Keath works as a Cyber Security Architect for Appalachia Technologies LLC(http://appalachiatech.com/) a Mechanicsburg PA-based Cyber Security and managed IT services company. Brandon has over 10 years of experience in a variety of disciplines with the major focus being on Cyber Security. Brandon lectures on several different IT security topics at local IT meetups discussing IT Security, hacking, and secure application development. Brandon has a Masters in Cyber Security and Information Assurance from Western Governor's University and a Bachelor's degree in Information Technology with a concentration in Applications Development from Central Penn College.
- Cyber Security Networking Meetup
*Location Locked In, there are currently no sponsors yet for this meetup as this is an informal networking meetup, you are on your own for food and drink* The current location will be Appalachian Brewing Company in Harrisburg, PA at the Abbey Bar. It is not 100% private and there will be live entertainment starting at 8 PM. No cover charge for those who are there before the live entertainment starts! There is a limited menu at the Abbey bar, but you are free to order from the lower part of the restaurant if need be. Grab a beer and some food(or don't) and network with fellow cybersecurity professionals (ethical hackers). Talk about trends in the industry, networking(without the ethernet plugs)! Swap stories about battles waged(don't break any NDA you might have signed) and share tips on how you handled a tough situation.
- Introduction to Ethical Hacking - 2.0
*Date and venue locked in!* Free Food provided by Appalachia!!! Raffle of Amazon Echo products sponsored by Europhins!!! In this fast-paced presentation, we will take a look behind the scenes at the basic hacking methodology that most hackers use when attempting to break into an organization. We will walk through the basics of hacker methodology including: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks This will be followed up with an introduction to the OWASP Top 10 and a discussion on web application vulnerabilities and becoming a security bug bounty hunter. This will be a high-level presentation with many practical examples and will set the stage for more targeted sessions that will delve deeper into these phases. Speaker: Brandon S. Keath works as a Senior Security Engineer for D&H Distributing, a Harrisburg, PA-based distribution company. Brandon has over 10 years of experience in IT in a variety of disciplines. Brandon lectures on several different IT security topics at local IT meetups discussing IT Security, hacking, and secure application development. Brandon is currently finishing his Master's in Cyber Security and Information Assurance from Western Governor's University. Directions to Harrisburg University http://harrisburgu.edu/directions-to-harrisburg-university-of-science-and-technology/