Location visible to members
*Note: Sorry, there was a conflict with the May General Body Meetup and the local security conference LayerOne. We support our local security community fully and hope everyone can participate at the conference. More details and sign up information are found here: http://www.layerone.org/
We have another General Body Meetup coming up at the end of June and we need some speakers. If anyone is interested in talking or has a topic they would like discuss, email me at peter <@> lethalsecurity.com. This is just a placeholder until we get some speakers on the list.
We need your continued support to keep LETHAL going strong!
Also, if you aren't on the slack channel, come hang out with us: https://lethalsecurity.signup.team/
==========Current Speaker List============
Topics: WiFi Hacking in 2017
Speaker: Valentin Leon is a Principal Security Consultant and has been with NCC Group for 4 years, performing penetration testing for a broad range of clients and technologies. He has worked in the industry for over 10 years, dividing his attention between development and security analysis. He has worked and contracted for a number of security and software companies, including fortune 500 companies such as Bloomberg as well as startups. Valentin leads engagements testing web applications of varying backends including .Net, Java, C/C++, and Python, internal and external network assessments, architecture and hardware reviews, protocol analyses, and mobile application reviews. Valentin has performed security research in the following areas: RFID, LTE, iOS and IMAP. Valentin has also given talks at the AT&T Cyber Security Conference.
Description: Is WiFi security a topic from the last century? Did the WiFi alliance successfully design a foolproof protocol? This talk will teach attendees the best techniques of 2017 to successfully crack or penetrate one of the most common RF protocols on the surface of our planet.
The presentation will starts by explaining[masked] basics to ensure that attendees understand how the protocol is designed, what the differences are between many[masked] versions and what hardware is necessary to perform attacks explained in the following sections.
Then all recent techniques to bypass current WiFi security will be reviewed. After an honorable mention of the good old WEP, WPA2-PSK, WPS and WPA2-Enterprise attacks will be explained and demonstrated. The many security options of WPA2-Enterprise will be debunked, and tools to help with the attack process will be introduced.
Lastly, security features on protections will be explained and if time allows, other attacks, such as denial of service, attacks on access-points and attacks on clients will be presented.
After attending this talk, attendees will know how to assess, attack and protect WiFi network in their home or at their work place.
Topics: Hacking Wi-Fi Without Cracking Wi-Fi : Using Social Engineering Techniques to Compromise Wi-Fi Users!
Speaker: Presented by the Cyber Security Research Team at Cal Poly FAST – the Forensics And Security Technology Club at California Polytechnic University at Pomona http://cppfast.org/ . Angelo Nicholas is the Vice President of Cyber Security Research for Cal Poly FAST. A US Army Veteran, he was Soldier of the Year for the 185th Medical Co. His experience in the industry includes being an IT consultant with Omni IT Solutions. Jordan Wheeler is the Director of Cyber Security Research at Cal Poly FAST. Formerly a wireless network technician and surveillance operator for the live events industry, he has worked on gigs such as the Pasadena Tournament Of Roses Parade, SXSW, Chicago Marathon, Austin City Limits, Lollapalooza, Electric Zoo, and Governor’s Ball.
Description: What's the weakest link in a WiFi connection? The Cal Poly Pomona Forensics And Security Technology Cyber Security Research Team presents theory and demo on using social engineering techniques to con access to WiFi, coax out email addresses and Facebook credentials, deliver malicious payloads, and more!
Topics: Still Needed
*If you want to speak at LETHAL, please let me know! We need both beginner and advanced speakers! :D
Parking in the school's lot is free.
=========Current Speaker List=========
The Hacker Playbook 2
The number #1 selling Amazon book on Software Testing. What to up your penetration testing game? Grab The Hacker Playbook 2! (http://www.amazon.com/dp/1512214566/)
Hackers Asking For Help! Booking these rooms do cost quite a lot of money. Any donations to keep this group going will help out tremendously. These donations will go straight back into our community. You can click the link below to donate via Paypal:
*If everyone can donate[masked] bucks, that would help out tremendously for the room reservation/food.