tag:blogger.com,1999:blog-84714983663000031162024-02-06T19:02:54.734-08:00The 304Geeks304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comBlogger66125tag:blogger.com,1999:blog-8471498366300003116.post-64722590168095057382015-05-15T08:55:00.001-07:002015-05-15T08:55:18.478-07:00Hack3rCon has retired. But, don't be sad. The 304Geeks have a new conference to share!Hack3rcon is no more...
Don't be sad. Although the name Hack3rcon will be no more, the spirit of the conference will live on through SecureWV. The 304Geeks latest conference creation.
Hack3rcon started after a group a local hacker types decided to try and bring much needed awareness to the folks that live and protect right here in WV. I put together a series of Hack3rcon alien videos for 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-25398547153088591042014-07-12T10:26:00.003-07:002014-07-12T10:31:12.669-07:00Hack3rCon CFP Opens!!
Hack3rCon CFP Opens!!
http://Hack3rcon.org
304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-45980556412589382502013-11-06T20:31:00.000-08:002013-11-06T20:31:40.191-08:00Create your own Raspberry Pi HackStation
P { margin-bottom: 0.08in; }
Recently, I became curious about the Raspberry Pi and what it
could be used for. For those of you that don't know what a Raspberry
Pi is, here is a short explanation.
The raspberry pi is a credit-card sized single-board micro
computer. The model-B raspberry pi features an ARM1176JZF-S 700 MHz
processor that can be over-clocked to 1 GHz. It also has a Dustin Yeagerhttp://www.blogger.com/profile/02934762369047107698noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-33699084875697894462013-01-14T12:23:00.001-08:002014-05-14T20:44:15.704-07:00[UPDATED] DNS Scraping for Corporate AV Detection - "Admins, stop sharing your cache with everyone!"NEW TOOL: Scrape-DNS
**Since this was first posted the technique has been implemented into Metasploit (which means it's on Kali Linux), Recon-ng and ArchAssault Project.
Back at my old job, we used cache snooping techniques (Scraping) to check for evidence of client systems that were attempting to resolve known malware sites.
We would use the list at 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-46250650333285330832012-10-07T18:39:00.000-07:002012-10-07T18:39:01.895-07:00Hack3rCon^3 - Doomsday Eve
What?
Hack3rCon^3
Doomsday Eve
When?
October 19-21, 2012
Where?
Charleston, WV
Doomsday preppers and cyber security enthusiasts will come together in Charleston, WV on Oct 19-21 for Hack3rCon^3.
304Geeks want to welcome you to another year of mayhem in the hills. Hack3rCon^3 will present a mix of cyber security and doomsday preparation tactics.
Presentations:
20 Speakers and onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-18119533915523942442012-10-06T07:02:00.001-07:002012-10-06T07:02:01.963-07:00Hack3rcon CTF
Description:
Hack3rcon CTF will be brought to you this year by the XRG, a
relentless group of bloodthirsty savages from outer space. From deep
within their hive they have hatched multiple challenges to include
web, traffic analysis, reversing, and more. Rigorous fun on all
levels from the newbist larva to the leetist overmind.
CTF Rules:
1. All flag submissions have to be received by 10 onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-53137933957496114772012-05-29T12:03:00.004-07:002012-05-29T14:58:06.442-07:00Larry Pesce will rock the keynote at Hack3rcon^3We are thrilled to announce our keynote speaker for Hack3rcon^3, Larry Pesce.
Larry is a Security Evangelist and co-host for the PaulDotCom Security
Weekly podcast (www.pauldotcom.com). In the last 15 years in the
computer industry he has become a jack of many trades, including, of
course, computer security. Larry is also gainfully employed as a
Penetration Tester / Ethical Hacker with NWN 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-82648354757859390452012-05-01T20:37:00.002-07:002012-05-29T10:34:09.203-07:00Mayday, Mayday, Mayday
Call For Papers | Sponsors
Call for Papers
Call for Sponsors
2012
Hack3rCon^3
Doomsday Eve
Doomsday preppers and cyber security enthusiasts will come together on Oct 19-21st, 2012, in Charleston, WV for Hack3rCon^3.
304Geeks want to welcome you to another year of mayhem in the hills.
Hack3rCon^3 will present a mix of cyber security and doomsday
preparation tactics.
Doomsday 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-74952436542173014812012-03-14T18:28:00.001-07:002012-03-14T18:28:36.719-07:00304Geeks is officially a 501c3Effective 12/22/2010
304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-52433988551778979412012-03-09T20:21:00.004-08:002012-03-09T21:08:49.997-08:00304Geeks Informaton Security Program For High School and Middle School Students and Parents OnlineVideo from my recent Nicholas County Cyber Security presentation has been released online: http://www.summersvilletv.com/index.php?option=com_content&view=article&id=1116&catid=88888895&Itemid=88888905If your civic group would like a similar online safety talk please contact me at bill(dot)gardner(at)gmail(dot)com.onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-31398462159065376602012-02-16T13:52:00.000-08:002012-02-16T13:52:11.205-08:00Location Based Alerting Systems - WTF? Ok, I guess it makes sense.. If there is some sort of emergency in your area (based on location services on your phone) a text alert can be sent to you. This message is in the form of a pop up.
I got one today. It simply read, "CMAS Alert" with an option to click a "Dismiss" button. That's it.
A little research and I found out that this message:
"CMAS Alert" followed by "Civil Emergency 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-45071592822541303802012-02-13T20:40:00.000-08:002012-02-14T09:59:24.427-08:00UPDATE: Hackers for Charity CookbookSo, let us revisit the HFC cookbook idea..
Recently, a lot of people have asked what the status of the cookbook is.
Well, (embarrassingly so) we only received 15 submissions.. I know, right?
So, Hackers for Charity Cookbook: ROUND 3
****Send your submissions to cookfu@304geeks.com
Criteria:
Name or handle:
Bio: (Optional, for directory)
Picture: (Optional, but desirable)
Origin:
Story(304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-57257897181384227172011-12-14T20:54:00.000-08:002011-12-14T21:17:02.115-08:00Neat visualization search engine thingy.. Check it out..I was researching new OSINT resources, when I came across SiloBreaker.com. This site has a nice web app with a really cool visualization and analysis thingy. Check it out, it rocks!
I will share more of my findings very soon.
Bill, you look important ;-)
Here is a search result for Hack3rCon:
jQuery(document).ready(function() {myWidget = new Silobreaker.Network({ query:"hack3rcon",304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-39325221785501065602011-10-17T17:33:00.000-07:002011-10-17T17:35:18.230-07:00New Platinum Sponsor: DerbyConThe 304Geeks would like to welcome DerbyCon as a Hack3rCon Platinum Sponsor: derbycon.comonceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-68920679174780135872011-10-12T02:24:00.000-07:002011-10-12T02:25:31.683-07:00Hack3rCon II Hotel Information And Conference RateConference rate is $84.00 a night. Call the hotel directly at 304-344-4092 and use the discount code hackercon.onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-67218297789176215622011-10-03T20:02:00.000-07:002011-10-03T20:04:01.321-07:00The Penetration Testing Execution StandardThe Penetration Testing Execution Standard (PTES) is now available as a Pre-Alpha release and is located at http://www.pentest-standard.org/index.php/Main_Page. According to their wiki page ( http://www.pentest-standard.org/index.php/FAQ ) , the Penetration Testing Execution Standard (PTES) “is a new standard designed to provide both businesses and security service providers with a common Kung Fu Walrushttp://www.blogger.com/profile/10925900524130395367noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-48946707534824080722011-09-22T15:55:00.000-07:002011-09-22T15:55:27.027-07:00Opinion: The Age of Artisanal EngineeringAndrew Huang posts an interesting essay on some potential (and exciting) ramifications of the deceleration of Moore's Law and the future shift towards incremental innovation over wholesale moves to entirely new hardware generations.The Raging Otakuhttp://www.blogger.com/profile/17187939837463676916noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-87016740605956273242011-09-15T07:26:00.000-07:002011-09-15T07:29:12.820-07:00Hack3rCon II Presentation: Lurking in the ShadowsTim Tomes and Mark BaggettSynopsis:"Lurking in the Shadows"In the past, hackers and pen testers have used various techniques to hide the presence of tools and information on compromised systems. Techniques such as alternate data streams in Windows, and directories with common names in Linux, have been basic implementations of such techniques. The addition of Shadow Copies to modern Windows onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-46219488616912218892011-09-14T18:21:00.000-07:002011-09-14T18:26:08.812-07:00Book Review: Metasploit The Penetration Tester's GuideSlashDot has posted a review of Hack3rcon II Speaker and all around Good Guy Dave Kennedy's new book Metasploit The Penetration Tester's Guide.Check out the Review HereBuy the book from Amazon Here Matthttp://www.blogger.com/profile/13147370082689290871noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-52843073315393962012011-09-04T07:42:00.000-07:002011-09-04T07:45:40.544-07:00Network King of the Hill (NetKotH) Challenge Returns To Hack3rConNetwork King of the Hill (NetKotH) will be returning to Hack3rCon this year. The rules are the same as last years challenge:
***BRING YOUR OWN LAPTOP!
w/dvdrom (unless you already have Backtrack 4 installed on your
computer OR OS of your choice.)
***Depending on how many participants we have, you may need to provide
a cat5 cable. Wireless will be available but not recommended ;-)
Scoring:
1. onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-33365810405583194332011-09-04T07:25:00.000-07:002011-09-04T07:26:49.659-07:00Jon Schipp has been selected as a presenter for Hack3rCon IIThe 304Geeks are pleased to announce Hack3rCon 2010 NetKoH winner and Black Badge holder Jon Schipp has been selected as a presenter for Hack3rCon II.onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-40539040656091423802011-09-03T03:50:00.000-07:002011-09-03T04:03:45.611-07:00The Hack3rCon Speakers presentations and bios page has been updatedGo to Hack3rCon.org and click on the Speakers link. Presenters this year include: Dave Kennedy (ReL1k), Adrian Crenshaw (Irongeek), Martin Bos (purehate), Borris Sverdlik (JadedSecurity), Joshua Perrymon (Packetfocus), Jon Schipp, Tim Tomes, Mark Baggett, Brian Martin, Keith Pachulski, @grecs, Chris Silvers, Pat McCoy, Charlie Vedaa, James Macgregor Watson, and Gus Fritschie, Jonathan Claudius.
onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-26029002542674503052011-09-01T12:25:00.000-07:002011-09-01T12:26:57.787-07:00Hack3rCon II Musical GuestsThe 304Geeks are pleased to announce special musical guest for Hack3rCon will be DJ Siberia, DJ Bloodlossgirl, and Dual Core.
onceehttp://www.blogger.com/profile/15277332209680865565noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-78090118922794090572011-09-01T11:50:00.000-07:002011-09-01T11:52:21.413-07:00Security breach on kernel.orgSecurity breach on kernel.org
See the site for details https://www.kernel.org/Matthttp://www.blogger.com/profile/13147370082689290871noreply@blogger.comtag:blogger.com,1999:blog-8471498366300003116.post-13700099157671378572011-07-16T08:52:00.001-07:002011-07-27T00:00:26.886-07:00304Geeks and Hackers for Charity Announce Hack3rCon IIBack by popular demand and hot on the trail of last year's success, Hackers for Charity and the 304Geeks bring you Hack3rCon II! Look forward to a new venue and new events!
What: Hack3rCon 2
When: October 21st-23rd, 2011
Where: Charleston, West Virginia @The Charleston House Hotel and Conference Center
Friday Oct 21st, Hack3rCon Podcast Party with Special Musical Guest: Dual Core
A call for 304geekhttp://www.blogger.com/profile/05635344046064284650noreply@blogger.com