Skip to content

Details

~7:15 MAIN Topic: "Cybersecurity & AI" , a review. Presenter: Tony Zafiropoulos
Reviewing where we are and what we need to look out for both positive vs. negative (IE. AI as used in attacks vs. in defense)

+++++++++++_
++++++++++++++++++__+++++++_+=+=+=+=+=+=+=+==+=+

~7:05pm CDT That MAIN TOPIC above is PRECEDED IMMEDIATELY by Announcements, a brief Q&A, & Introductions. Thats at about 7:05.
Those announcements & Q&A are preceded by...
+++++++++++++
6:30pm
BASE Topic:An adventure in starting network "sniffing". Episode 1 of a series! Presenter: Grant Taylor & Lee Lammert

Just starting to "sniff" to see what is going on at that network interface?

Is it: ... fast? ...Slow? ...Screwed up? ...HACKED??
What are you looking for?
What are the tools (WireShark, Sniffer, etc...)?
How to start sniffing...?

Have you ever:

  • "sniffed" a network?
  • Searched for specific traffic (e.g.DNS)?
  • Captured that traffic without taking disk space on that source system?
  • Analyzed that traffic in clear text?

Be sure to attend the tutorial on Wednesday and get these questions answered, and more!

But wait!! This is only the FIRST tutorial in a series of increasing complexity with members of the "SLUUG Sysadmin team" contributing different perspectives to diagnose issues with one of our serves.

Tease: If you're curious what "tcpdump", "Wireshark", "tshark", and "snoop" have to do with network sniffing, then you're going to want to make sure to attend ....

And, if you thought sniffing unencrypted traffic was impressive, wait until you can do and SEE with encrypted traffic. Yes, you read that correct, we're going to look into encrypted traffic from a network sniffer. (More likely encrypted will be in future month's presentation, but tonite will lead you to it.)

Related topics

AI and Society
Artificial Intelligence
Computer Security
Software Security
Computer Forensics

You may also like