Location visible to members
I hope everyone enjoyed the LETHAL CTF and congrats to Emmanuel and Steven for winning the Grand Prizes!!!
So what's next! We have another General Body Meetup coming up at the end of March and we need some speakers. If anyone is interested in talking or has a topic they would like discuss, email me at peter <@> lethalsecurity.com.
We need your continued support to keep LETHAL going strong!
==========Current Speaker List============
Topics: USB Device Analysis
Speaker: James Habben
Description: You already know that USB devices present a danger of infection to users, but how do you determine the level of risk? To make things harder, there are advanced USB devices and OS exploits that can infect even your examiner workstation if you don’t take the appropriate precautions. I will walk you through an investigative methodology to both discover the threat quickly, and protect your assets in the process.
Topics: Medical Devices: How To Hack Them, How to Secure Them
Speaker: Adam Brand has more than 17 years’ experience in information technology and security. He is a Director with Protiviti, where one of his focus areas is healthcare and medical device security. Adam has been heavily involved with the “I am The Cavalry” movement, a group of researchers focused on cybersecurity issues that can affect human life and safety. He is actively engaging with healthcare organizations and device manufacturers on the very important topic of medical device security and has spoken at many industry conferences on this issue.
Description: Medical devices are increasing in software and network connectivity dependency at a rapid pace --- and with the benefits to software and connectivity come vulnerabilities and exposure. Even if you don’t work with medical devices on a daily basis, you or someone you care about will depend on a medical device at some point in the future; so it is important to stay current on the security of these devices. In this talk, learn about the past five years of security research into medical device vulnerabilities, including the results of a honeypot experiment where devices simulating medical devices were placed on the Internet. Adam Brand will dive into the details on specific medical device vulnerabilities and cover how regulators, medical device manufacturers, and healthcare organizations are addressing the risk.
Topics: Man-In-The-Middle Attacks as a Means to Disable and Bypass Encryption
Speaker: Lucky Wicklingham
Description: The presentation includes a look at various MitM tools, how they work, how they can be applied, an explanation of their usage, a demonstation, and a look at some vulnerable websites and attack methods. It focuses especially on bypassing encryption techniques which usually render this sort of attack inneffective.
Parking in the school's lot is free.
=========Current Speaker List=========
The Hacker Playbook 2
The number #1 selling Amazon book on Software Testing. What to up your penetration testing game? Grab The Hacker Playbook 2! (http://www.amazon.com/dp/1512214566/)
Hackers Asking For Help! Booking these rooms do cost quite a lot of money. Any donations to keep this group going will help out tremendously. These donations will go straight back into our community. You can click the link below to donate via Paypal:
*If everyone can donate[masked] bucks, that would help out tremendously for the room reservation/food.