Location visible to members
This is a place holder for our next LETHAL General Body Meetup. We are skipping on July's meeting as it lands on DefCon week!!! Make sure to join our slack channel to find out what we are doing at DefCon ( https://lethalsecurity.signup.team/ ).
First, we are still looking for more teams to sign up for the Blizzard CTF (https://www.meetup.com/LETHAL/events/241125180/https://www.meetup.com/LETHAL/events/241125180/). If you participated in the LETHAL CTF earlier this year, it'll be in a very similar format. This will be challenging both for the noobs to the pros, so make sure to get a team and get INVOLVED! If you don't have a team but want to play, there are plenty of people looking for teams in the LETHAL Slack ( https://lethalsecurity.slack.com/ ).
Second, since we have another General Body Meetup coming up at the end of August, we are in need of some more speakers. If anyone is interested in talking or has a topic they would like discuss, email me at peter <@> lethalsecurity.com. This is just a placeholder until we get some speakers on the list.
Third, we opened up a bunch of one day Web Hacking and Red Team courses. Sign up and learn from the Pros! Check us out at: http://lethalsecurity.com/
We need your continued support to keep LETHAL going strong! RSVP list will open up on August 1st.
==========Current Speaker List============
Topics: Cloud Security
Speaker: Kevin Bang
Description: Never lose your AWS API logs with self healing CloudTrail. In a setup using Lambdas, CloudWatch Events, and SNS, CloudTrail will be rebuilt to the best known configuration automagically when anyone modifies or deletes your CloudTrail configs and as well as alerting you.
Topics: It's Just a Flesh Wound
Speaker: Brett Gravois
Description: As more and more companies are breached via the web, security professionals continue to focus their attention on the critical and high severity vulnerabilities. While this approach would seem to make sense, it overlooks the fact that attackers are getting in through a key attack vector: low to medium severity vulnerabilities. Chained together, these 'low hanging fruit' vulnerabilities can own your web application. This presentation will help security teams think more holistically about the attack landscape. It will illustrate how an attacker can chain together lower end vulnerabilities to own your web application, the tools and tactics they might use, and how to prevent this from happening to you.
Topics: Malware Landscape
Speaker: Kevin O'Connell
Description: In 2017 we have seen malware mature as an industry. We have seen the development of malware infrastructure and vendors. Malware companies are much like other tech companies and must make analogous business decisions. We will look at a specific malware vendor and a modern-day phishing campaign.
*If you want to speak at LETHAL, please let me know! We need both beginner and advanced speakers! :D
Parking in the school's lot is free.
=========Current Speaker List=========
The Hacker Playbook 2
The number #1 selling Amazon book on Software Testing. What to up your penetration testing game? Grab The Hacker Playbook 2! (http://www.amazon.com/dp/1512214566/)
Hackers Asking For Help! Booking these rooms do cost quite a lot of money. Any donations to keep this group going will help out tremendously. These donations will go straight back into our community. You can click the link below to donate via Paypal:
*If everyone can donate[masked] bucks, that would help out tremendously for the room reservation/food.