First Hacker Playdate This Saturday
Cyber Tech Cafe and Piratica are co-hosting the first Hacker Playdate on Saturday, 20 June 2015 from 10:00am EDT until 6:00pm EDT. There will be (audience participation) discussions, demonstrations and events throughout the day as well as three main demonstrations at 12:00pm EDT, 2:00pm EDT and 4:00pm EDT. There is no-cost to attend and audience participation for all of the events is welcome and encouraged. Drop by for the demonstrations or stay the whole day.
Where, When and How Much?
- When – Saturday, 20 June 2015 from 10:00am EDT until 6:00pm EDT. Drop by for the main demonstrations or stay all day!
- Where – Cyber Tech Cafe, 148 West Main Street, right across from Findley’s Butcher Shop on Main Street beside Primo’s Mexican Restaurant.
- How Much – FREE
Who should attend:
- Business owners, leaders and managers. Do you own a business or are you responsible for managing a business and confidential data (HIPAA, PCI-DSS, etc.)? Do you know how attackers target your business and, once targeted, how they attack? Find out Saturday and talk candidly with expert in the field.
- Tech Enthusiasts. Do you want to tinker with technology and hang out with other like minded folks?
- Security Enthusiasts. Kali. Metasploit. Veil. Got root? In addition to the main demonstrations we will be discussing and tinkering with everything from password cracking with THC-Hydra to ARP poisoning with Arpspoof and Ettercap.
- Everyone. It’s hard to turn on the news and not hear about another ‘cyber attack’, virus, data breach, etc. Come meet and talk to folks that spend their days (and nights and weekends) eating and sleeping high-tech.
Demo Schedule:
- 12:00pm EDT – Why is physical security important? Cyber Tech Cafe will be demonstrating the importance of physical security by attacking a system via exposed USB ports. Many systems today, including POS systems, are PC based and have USB ports exposed, unsecured and unmonitored available to unauthorized passers by. In this demonstration, you’ll see how quickly an attacker can setup shop using these exposed ports, generally completely undetected.
- 2:00pm EDT – The anatomy of an attack. When an attacker ‘breaches’ a system, how do they do it, what can they get and what are your options and defenses as the [potential] target? We will go through an attack from the initial reconnaissance, setting up the attack, execution of the attack, browsing the newly compromised system and covering the tracks. Understanding how the attacker thinks and how the attack works will offer a lot of insight into how to defend yourself or your business.
- 4:00pm EDT – Buffer Overflow Attack by example. We will have a guest speaker demonstrating buffer overflow attacks.
Additional Discussions:
- Hardware Hacking – Ever wanted to see what kind of computer you could build for $50? There will be informational discussions and hands-on demonstrations with the Raspberry Pi as a desktop replacement, thin client and media center.
- Lock Picking – If you don’t have a home alarm now, you may reconsider after seeing the demonstrations and discussions about lock picking.
- Wireless Security – Ever wondered what a ‘man in the middle’ attack was?