Below are our past club meetings. The PowerPoints and Meeting Minutes will be posted on this page shortly after each weekly meeting.
- April. 4 Meeting: Presentation - Minutes
- March. 21 Meeting: Presentation - Minutes
- March. 8 Meeting: Presentation
- Feb. 21 Meeting: Presentation - Minutes
- Jan. 24 Meeting: Presentation - Minutes
- Nov. 29 Meeting: Minutes
- Nov. 1 Meeting: Presentation - Minutes
- Oct. 4 Meeting: Presentation - Minutes
- Sept. 20 Meeting: Presentation - Minutes
- Sept. 6 meeting: Presentation - Minutes
- Sept. 7 meeting: Introduction and Elections, Presentation - Minutes
- Sept. 14 meeting: Phishing Scams, Presentation - Minutes
- Sept. 28 meeting: Capture The Flag (CTF), Presentation - Minutes
- Oct. 5 meeting: Social Engineering and Internet Threats, Presentation - Minutes
- Oct. 12 meeting: Red Team strategies, Presentation - Minutes
- Social Engineering with OSINT
- Keyloggers: How they work
- Embedded Code in YouTube Videos
- Python Type Hinting/Checking
1. Informational Meeting
2. Kali Linux Crash Course
3. Introduction to Enumeration with Kali Linux
4. Hacking a Vulnerable Machine
5. Club Hackathon
6. History of Ransomware w/ Demonstration
- Encryption and Obfuscation
- Hack the Box
- Reverse Engineering
- Overthewire.org Challenges
- BloomCON Details and Planning
- Memory Acquisition and Analysis
- Virtual Machines (Meeting Minutes)
- Securing Linux Servers (Meeting Minutes)
- Hindsight-2020 (Meeting Minutes)
- Full Disk Encryption (Meeting Minutes)
- Overthewire.org Challenges (Meeting Minutes)
- Digital Forensics and Data Recovery
- Attacking RaspberryPi
- NSA Code Breaker Challenge
- Private, Secure, and Anonymous Internet Browsing
- Smartphones: Unlocking their potential
- Counterintelligence: Doxxing, Information Brokers, and More
- Virtual Machines: A Comparison of Virtual Technologies in IA
- NSA Best Practices and TAO Unit
- Digital Forensics Workshop and/or Middle Eastern Cyber-war Capabilities
- The Deep Web
- Logic Bombs
- Buffer Overflow
- Man in the Middle Attacks and Address Resolution Protocol (ARP) Poisoning
- Special guest: Dr. Giever presents Informatics
- Network Security Fundamentals
- Network Security Fundamentals 2
- Physical Security
- Basic SQL Injection and XSS Attacks SQL InjectionXSS Attack
- Advanced SQL Injection and XSS Attacks XSS Attack (Advanced)
- Network Sniffing and Password Cracking using Cain and Abel ()
- Creating and Implementing Keyloggers with IDLE IDE and PyHook
Meeting Dates | Topic and Content |
September 6, 2011 | Presentation: Windows Exploitation with Metaspoit () (Slides) |
September 20, 2011 | Presentation: Building a Virtual Lab () (Slides) |
September 27, 2011 | Presentation: Google Hacking () (Slides) |
November 1, 2011 | Colin O'Hanlon will present on SamSpade |
November 15, 2011 | Nick Johnson will present on CUDA password cracking. (Flyer) |