Meetings

Here is the archive of all our past club meetings. PDFs of the slides and YouTube recordings of the meetings are included when available. We hold meetings every Wednesday at 6:30pm in Rhodes 850D, so why not join us for the next one?

# Title Date Links
93 Pwn Adventure Apr 24, 2019
92 Senior Designs and MBE crackmes Apr 17, 2019
91 Battelle Presentation on Reverse Engineering Apr 10, 2019
90 MBE Basic Binary Exploitation Apr 3, 2019
89 Lab Updates Mar 27, 2019
88 GHIDRA Mar 13, 2019
87 REVOLUTION@UC CTF Review Mar 6, 2019
86 Cyber@UC CTF-TOOL Demo Feb 27, 2019
85 Goat Dissasembly Feb 13, 2019
84 SQL Injection Feb 6, 2019
83 Career Fair Prep Jan 30, 2019
82 ICMP and ARP exploits Jan 23, 2019
81 Intel Management Engine and Other Coprocessors Jan 16, 2019
80 Worldwide Cyber Dec 4, 2018
79 Metasploit and exploits Nov 27, 2018
78 Aaron McCanty visiting from Battelle Nov 20, 2018
77 Goat Dissasembly Nov 13, 2018
76 MITRE Framework (continued) Nov 6, 2018
75 MITRE Framework (continued) Oct 30, 2018
74 MITRE Framework Oct 23, 2018
73 Introduction to Linux Distributions Oct 16, 2018
72 Firewalls and IPTables Oct 9, 2018
71 Networking Part 2: Networking Analysis Oct 2, 2018
70 Networking and Basic Security Sep 25, 2018
69 NSA Visit with Enigma Machine Sep 18, 2018
68 Advanced Persistent Threats Sep 11, 2018
67 Bash and OverTheWire Sep 4, 2018
66 Welcome New Members! Aug 28, 2018
65 Planning for Fall Semester Aug 22, 2018
64 Wireless Auditing and Monitoring Tools Aug 15, 2018
63 Contributing to the website Aug 8, 2018
62 Finals Week Aug 1, 2018
61 Running a Linux box securely Jul 25, 2018
60 Aircrack with Chris Jul 18, 2018
59 Cool GitHub Projects! (actually) Jul 11, 2018
58 Cool GitHub Projects! Jun 27, 2018
57 SDR Fun! Jun 20, 2018
56 W I F I Jun 13, 2018
55 Wireshark Demo Jun 6, 2018
54 Router Login Bypass May 30, 2018
53 Cross-Site Request Forgery (CSRF) May 23, 2018
52 BSides Recap and Memory Scanning May 16, 2018
51 Reverse Engineering: Android apps and more May 9, 2018
50 Systems Exploitation: Metasploit Apr 18, 2018
49 Systems Exploitation: Sniffing, Man in the Middle, etc. Apr 11, 2018
48 Docker and OpenVAS Apr 4, 2018
47 POCs, CVEs, and Scanning Mar 28, 2018
46 Direct Recon, pt. 2 Mar 21, 2018
45 Direct Recon, pt. 1 Mar 7, 2018
44 Indirect Recon Feb 28, 2018
43 Cross-Site Scripting (XSS) Feb 21, 2018
42 CEH Cryptography Feb 14, 2018
41 CEH Networking, pt. 2 Feb 7, 2018
40 CEH Networking, pt. 1 Jan 31, 2018
39 Guest Speaker Dr. Williams Jan 24, 2018
38 Becoming a Certified Ethical Hacker Jan 17, 2018
37 Virtual Machine Setup Jan 10, 2018
36 Red Team Recap Dec 6, 2017
35 Learning Exploits Nov 29, 2017
34 Learning DataPackets Nov 15, 2017
33 Learning Kali Linux Tools Nov 8, 2017
32 Setting up a Virtual Machine Nov 1, 2017
31 Hardware Hacking Oct 25, 2017
30 Metasploit and Armitage Basics Oct 18, 2017
29 Mimikatz Password Stealing Oct 11, 2017
28 Cyber Kill Chain Oct 4, 2017
27 Assembly and APTs Sep 27, 2017
26 Ida Pro and more! Sep 20, 2017
25 Vulnerabilities and more! Sep 13, 2017
24 Meet New Leadership and Wireshark Sep 6, 2017
23 Networking, Bash, and CTFs Aug 30, 2017
22 Cuckoo Sandbox Demo Jan 1, 1900
20 Malware Sandboxing with Cuckoo Jan 1, 1900
18 Meeting 18 Jan 1, 1900
17 Dumping Windows Credentials, Threat Intel, and more Jan 1, 1900
14 B-Sides and Wargames Jan 1, 1900
12 Wargames! Jan 1, 1900
6 Wireshark and Future Plans Jan 1, 1900
5 Wireshark and more Jan 1, 1900
4 Meeting 4 Jan 1, 1900
3 Wireshark, Web Development, Encryption Jan 1, 1900
2 Committees, Leadership, and Goals Jan 1, 1900
1 UC.yber Introduction Feb 26, 2017