What we're about

The St. Louis 2600 meetup is a monthly meeting dedicated to hacking in all it's forms. An expansion of the original meetings started by the long running magazine of the same name as an open forum for anyone of any age, or level of expertise, to come and learn. Meetups are held on the first Friday of every month all over the world and here in St. Louis. The Meetup is held at Arch Reactor, St. Louis first Hackerspace, and usually gets started around 6pm.

The meetup will normally consist of a presentation, followed by discussion. If you'd like to make a presentation, please let the organizers know at least a week or two ahead of time so we can make sure to have time allotted. Presentations on any topic related to hacking, privacy, or computers are welcome. Presentations also don't need to be very in depth, feel free to bring presentations that are just introductions to things you think are cool.

Upcoming events (5+)

"Peeking at Data's Firmware"

Arch Reactor

I was browsing online as one does when I came across an unfortunate question: "Does Lt. Cmdr. Data poop?" Dammit if that question is going to continue to haunt me. I can't think of an answer to that question without going to dark disturbing place, and I'm pretty sure we'd all regret it if I did. There's all the subsequent questions that it raises as well. I mean, assuming Data was equipped with the correct "hardware", there must be corresponding software to drive it, right? Is that a solved coding problem in the 24th century? What kind of variables are you dealing with? Did Data have to wear diapers until Dr. Soong got all the incontinence bugs worked out? Can you file a software patent for that kind of thing? There must be a way to answer these kinds of questions. And you should all know at this point that when I start talking about Lt. Cmdr Data that I'm eventually going to twist it into some kind of awkward metaphor about the topic for the upcoming STL2600 + DC314 talk. Well aside from the addition of poop jokes this time around, why should this time around be irregular? Let's assume for the moment we've somehow got a copy of Data's sphincter control drivers. How are we suppose to figure out how it works? Buttholes for a Soong-type android aren't just something you can pick up at Micro Center, so it would be difficult to just run the code and tap that ass's I/O. What if we took a look at the compiled driver itself? It certainly would be a lot less messy, right? Regardless of how smooth an androids bottom might be. Well Nik, "The Borg Queen", has returned to help us assimilate all the knowledge we need to get started reverse engineering all the robotic soft-serve drivers we can handle. Nik is going to show us how to use Radare and Cutter to pull apart a binary and make sense of the underlying assembly code. We'll learn some of the Basic syntax, instructions, registers and conditions, as well the fundamental precepts in Reverse Engineering CTFs. Why is she doing this? Because she's the shit, that's why. Part of this talk will be a workshop, so everyone is encouraged to play along. You can download the Cutter software for Windows, Linux, or MacOS from https://github.com/radareorg/cutter/releases. Ideally you'd want a VM setup as well to play around in, but it's not strictly necessary since we won't be handling anything malicious. I'm so excited about this one, I might just crap myself.

The *NEXT* STL2600 + DC314 Meetup

Arch Reactor

Topic to be determined...

The *NEXT* STL2600 + DC314 Meetup

Arch Reactor

Topic to be determined...

The *NEXT* STL2600 + DC314 Meetup

Arch Reactor

Topic to be determined...

Past events (70)

Photos (49)

Find us also at