SUMMARY: First we go over any Splunk questions and do a review of the SPL101 course. Next we are going to go deeper into various Splunk functions. Then unleash the power of Splunk with Regular Expression. Finally tips and tricks for our Splunk CTF. GOAL: Learn a little more about Splunk and how to create […]
SPL101 – Splunk more than just cool T-shirts DATE: 26OCT2017 TIME: 1900-2100 TOPIC: INFOSEC NIGHT: Intro to Splunk SUMMARY: We are going to an introduction to Splunk. Topics that we will go over will include parts of the Splunk architecture. How to integrate Splunk with other technologies. Using Splunk as a SIEM. How to get […]
DATE: 10OCT2017 TIME: 1900-2100 TOPIC: INFOSEC NIGHT: Best Practices for Keeping Your Home Network Secure SUMMARY A Discussion on Best Practices for Keeping Your Home Network Secure. During this event we will discuss those best practice topics recommended by information security professionals for personal home networks. During this event participants will openly discuss and provide […]
DATE: 28SEP2017 TIME: 1900-2100 TOPIC: INFOSEC NIGHT: Intro to Dynamic Malware Analysis SUMMARY: Tonight we are going to talk about the basics of malware analysis, and we are going to do it by live detonating a few malicious files on screen and going through the findings together. This will be one part Q and A […]
DATE: 21SEP2017 TIME: 1900-2100 TOPIC: INFOSEC NIGHT: War Stories from the Red Team SUMMARY: Penetration testers attack systems, exploit people, process, and technology. We break in, root around, and cause mischief and mayhem, and they pay us for it. Why? Because knowing what the bad guy can do helps corporations prevent the real bad guys […]
DATE: 10AUG2017 TIME: 1900-2200 TOPIC: INFOSEC NIGHT: Practical Privacy with a slice of Pi SUMMARY: Our privacy online has never been under more threat than it is today. With bulk data collection rampant, and ISPs obtaining the right to sell browsing history how do you maintain a practical level of privacy and take control of […]
SUMMARY: For those in INFOSEC and starting out in INFOSEC there is a small barrier to entry to some jobs. Ok there are a few barriers but those are not tonight’s topic. We will talk about all the Alphabet soup Certifications that keep popping up on job requirements and the best way to tackle them. […]
Thank you to Everyone for coming out to INFOSEC NIGHT. We started off a little slow and with some confusion and some help from the crowd I think we are on the right track. I am not sure if I misrepresented what the idea was for the event. I will just clarify so we […]
TOPIC: Working Group-Build a better Kali Kick Off SUMMARY: Kali Linux is like that Swiss Army Knife that everyone has with 127 tools on it. Some tools are used more often and for the most part the rest of it is just bloat and goes unused. I am not saying Kali is unusable and is […]
Thank you to Everyone for coming out to INFOSEC NIGHT. We had a great turn out. I like seeing the new faces in the crowd. I am glad more and more people are learning about INFOSEC and about Unallocated and what we have to offer. I hope everyone liked the presentation. I tried […]
TOPIC: RaspberryPi Hacking/INFOSEC Projects SUMMARY: There are lots of cool projects on various flavors of RaspberryPis that we can try talk about or give feedback on. Anything and everything from using a Pi Zero to make a Usb Injection tool to a makeshift Angry Access Point to a rogue network device. Bring your ideas bring […]
TOPIC: HOME NETWORK SECURITY SUMMARY: There were a few people really interested in improving their home network security or sharing tools and settings. So this week we will talk about how to improve your security at home. Some people just have the Internet Service Provider Router and the configuration it was installed with. We will […]
Join us at the space for the first official InfoSec night hosted by Wasabi and Understudy77 with special guest speaker Jeff Wichman, the director of Enterprise Incident Management with Optiv security. New or experienced in InfoSec topics, come out and enjoy some pleasant conversation and a transfer of knowledge regarding digital forensics, IT consulting, Malware […]