December 13, 2017

DEF CON 24

DEFCON Hacking Conference

DEF CON is one of the oldest and largest continuously running hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. All events at DEF CON were conceived by the attendees. Some people play capture the flag the entire time, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all the talks….

Volunteers Needed For Black Hat Briefings This Summer

Black Hat 2015

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year. Click this link to submit your application: https://cfp.blackhat.com/volunteers/new This is…

Black Hat 2015

Black Hat 2015

Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown…

Hacking: A Career Or A Lifestyle?

Cyber Security Cave

Your success within information security is ultimately tied to your own dedication to the topic. In other words, if you’re not hacking in your free time, you’re not living up to your potential. In an odd twist, what you do in your free time really DOES impact your success in your work time. Let’s look at it this way. A student attends University in a effort to create a career they will hopefully enjoy, and benefit from. And it’s true, a University degree does offer tremendous value, even in the field of information security. But, in truth, Universities are often…

New Methods of Attack?

Back in the late 90’s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…