What we're about
Upcoming events (4)
A brief introduction by Edward Miro, known as @c1ph0r on Twitter, to the art of social engineering, then a live demo of some of the most popular tools used to run social engineering campaigns including: Maltego, The Social-Engineer Toolkit (SET), King Phisher, and Gophish. Q&A after(time permitting). We will meet virtually using https://www.gotomeet.me/DC401 This meeting is in partnership with the Tech Collective (https://tech-collective.org)
Description/Summary: I started making electronics projects in mid-2019 on a shoe string budget. I also plunged head first and blind folded into surface mount technology (SMT) printed circuit board (PCB) design. I quickly realized I wanted tools to make my projects possible and - if possible - as easy as possible. (There were a lot of possibilities.) With not a lot of money, and perhaps not a lot of forethought, I started making my PCB assembly own tools. General Intent: I knew I wanted to make PCBs with SMT parts. I looked around and watched YouTube and Instagram and gradually pieced together what I wanted my PCB assembly process to be. I wanted to be able to quickly populate a PCB. I wanted to reflow the PCBs. I wanted to be able to program the microcontrollers at my bench without the need for my computer. So, I started by making a reflow hotplate. Then I made a portable programmer for ATMega and ATTiny chips. Then I created some SMD strips holders. Then I assembled a vacuum pen. Collectively, these DIY tools make up the majority of my electronics assembly workflow. What did you make so far: A whole lot of PCBs. I started with 4 SCREAMZY toys ; then came 10 holiday ornaments (with blinky LEDs and beepy noises); 250 of the 2020 eChallengeCoins; and another 50 holiday ornaments. I've made hundreds of PCBs and placed thousands of SMT parts in the past 9 months. Speaker: Bradán Lane Twitter: @bradanlane Instagram: @bradanlane GitLab: https://gitlab.com/bradanlane eChallengeCoin: https://aosc.cc
By now we are all familiar with Threat Modeling and the very positive effects that it can have on application security. I've found that by tweaking the Threat Modeling Model (is that recursive?) just a bit you can also use it as a way to think about how to keep your infrastructure operating in tip-top shape when Murphy's Law strikes. Using these principles inside of some large companies, I have found surprising holes that were laying just under the surface. We will explore some of these and how threat modeling may have shown them up before they impacted business. Presentation by David Greer Event is co-sponsored by Tech Collective https://tech-collective.org
We are bringing back DC401! I think we have a great hackerspace for us, just working out those details now. I am targeting January for a first meetup. But I'll get the space squared away and I'm asking that you come and present on something. Let's turn this into a mini-CFP. Post below what you can talk about. Let's say something that takes 15-20 mins for starters. Anything at all related to making, breaking, hacking, building, whatever. Whatcha got people?