Python Applications

• Brief High-Level Overview of Python • Applications • Anaconda • Running Programs • GUI’s • Numerical Methods • Image Processing • GPU Processing • Machine Learning Presented by Douglas Winfield
Read More

WannaCry ransomware recap

For the last few days the WannaCry ransomware event created mayhem, where organizations worldwide were hit with ransomware that spread quickly primarily via a self-propagating worm mechanism. It exploited vulnerable versions of Windows, even though patches were made available two months ago. Most organizations should have been able to avoid this situation by using a supported version of Windows and patching quickly enough. Here we are going to recap where things stand with this threat and share a few details from our analysis.
Read More

Hacker Boot Camp Course #2 – Linux Kernel

Course Topics: • What is the Kernel? • How to compile a system specific kernel for better system performance. • How to apply a kernel patch. • How to edit the kernel. • Hardening the kernel against cyber threats. Anyone wanting to work along with the class and compile their kernel mid-instruction should bring a laptop.  The instructor will be compiling a kernel on an ubuntu based Linux distribution.  Please plan your VM's or laptop Operating Systems accordingly. Course slide and supplimentary files are available at:  https://github.com/osteth/HackerBootcamp
Read More

Special Guest & SpaceApp Breakdown

We have some special guest coming to present some really cool hardware. That's all we can say about it due to secrecy. You don't want to miss out. Also we can talk about what happened at the NASA spaceapps challenge.  Little demo and talk of the CTF codebase that the CTF team has been working on.
Read More

Python Crash Course @ Space Apps Challenge

We have partnered up with NASA Space Apps Challenge to provide a free Python Crash Course. We also would like to stay as a Hackbama team and compete at the 32-hour event to win prizes. This is a 2 event themed meetup. One at Real Estate Row, and other at Lowe Mill. Any questions or confusion just ask us on the forum or call. Come check this 1st-time ever event in Huntsville. Come say "hi," join the team, find an interesting project to do on your own or with a team. The event is free of cost to all participants. 1st Part - Kickoff Party and Python Crash Course Join us on Friday evening, April 28, at the showroom of Real Estate Row (1806 University Dr NW, Huntsville) for Huntsville's…
Read More

Internet Privacy Rule is dead. Now what?

Congress killed the FCC privacy rules that would restrict ISP from selling your data. Come out this Sunday and we'll have a double presentation that will touch into the policy and why it hurts all customers. We'll also talk about how to protect, or at least make it harder for ISPs to track your online activity.
Read More

Course #1 Hardware Assembly

●Learn the components of an embedded system.   ●how to assemble the embedded system   ●How to solder   ●Make your own custom IOT device Discus ways that system can be expanded to do more Cost for the hardware is $25 one time fee. Includes an embedded system with ram, CPU, wifi, usb, ethernet, power cable, connection cables, SD card, and case
Read More

Cyber Hunt

Main topic notes: Talk about the current and new threats emerging on the front lines of cyber. Lets also talk about Cyber Hunting!! Today’s threats demand a more active role in detecting and responding to sophisticated attacks. Traditional security measures like firewalls, IDS, endpoint protection, and SIEMs are only part of the network security puzzle. Cyber Threat Hunting refers to proactively and iteratively searching through networks and datasets to detect threats that evade existing automated tools. It includes using both manual and machine-assisted techniques, and aims to find the Tactics, Techniques and Procedures (TTPs) of advanced adversaries. Hunting goes beyond rule or signature-based detection and instead utilizes a hypothesis-driven approach is often supported by behavioral analytics. From large corporations to SMBs, there are many levels of hunting maturity, but many organizations are already hunting for threats…
Read More

How to get Paid PenTest Tools for free

Main topic notes:  Learn about the tools in the industry and how to get them.  Nexpose, nessus, metasploit pro, cobalt strike, qualys, etc. ------------- Learn how to setup and install VM (virtual Machines) and to get yourself a platform to run on. ------------- Intro to Kali linux, what is it what it does and where to start. ------------- Software that runs on the common ports. SSH, FTP, SMTP, HTTP, etc. 22,21,25,80 What to bring: Bring your computer/mac/pc whatever if you want help setting up a virtual machine platform to start using tools and learning them. Agenda: Bypassing Easter Sunday Vote on meeting a week before or after??
Read More