Maintaining Access to Compromised Systems II

Friday, January 11, 2013 - 12:39pm

How do hackers maintain access to a system once it is compromised? What are the tools and techniques that are used to create and maintain a backdoor to a system? In this session you will learn about the methods used by hackers to continuously control and access to your systems. While the hands on labs will cover the offensive measures, it will also go over some of the defensive measures that can be used to uncover and prevent these backdoors.

December Meeting-Maintaining Access to Compromised Systems

Wednesday, December 12, 2012 - 10:13pm

How do hackers maintain access to a system once it is compromised? What are the tools and techniques that are used to create and maintain a backdoor to a system? In this session you will learn about the methods used by hackers to continuously control and access to your systems. While the hands on labs will cover the offensive measures, it will also go over some of the defensive measures that can be used to uncover and prevent these backdoors.

Please note the new location and time. The new location has more space for the growing user group. Thanks goes out to Lockheed Martin for providing this space for the meeting. We will also be meeting on Tuesday this month because there is a company holiday party on Wednesday.

November Capital Area Cyber Security User Group Meeting - Security Penetration Testing Crash Course

Tuesday, November 20, 2012 - 3:11pm

Are you new to security penetration testing? Perhaps you took the first step and decided to participate in the Capital Area Cyber Security User Group to expand your knowledge. Whether you have missed several of our training sessions or want a solid review, we will walk through the major phases of a penetration test with hands on exercises that will bring you up to speed and reinforce what you may already know.

October Capital Area Cyber Security User Group Meeting - Building a Virtual Cyber Security Playground

Wednesday, October 10, 2012 - 3:21pm

Have you ever wanted to test out security tools but didn’t have an environment to do so? Have you wanted to try the same techniques that hackers use to better understand how to defend against such attacks but didn’t have a safe place for testing? Are you tired of going to expensive training classes only to find out that you never get a chance to play at home? This session will show you how to setup a lab on a shoe string budget. You will be empowered so that you can practice on the go in order to quickly and efficiently study for the CEH exam. If that is not enough to convince you, everyone in attendance will be entered into a raffle for a chance to win a free 32 Gig USB thumbstick with a pre-built security lab.

September Capital Area Cyber Security User Group Meeting - DEFCON 2012 Rundown

Friday, August 31, 2012 - 4:08pm

Didn't make it to the coveted Defcon security conference in Las Vegas this year? Don't worry, this session will go over some of this year's Defcon highlights. Perhaps your new to Defcon. Want firsthand knowledge on
what it is like to go to Defcon? Come find out everything you always
wanted to know about Defcon but were too afraid to ask.