Markdown
# Neg9 Seattle - Nov 13, 2017 ## Meeting Vitals | | | |-|-| |**Location**|University of Washington [Map](https://www.google.com/maps/search/UW+Computer+Science+%26+Engineering+-+Room+403,+185+West+Stevens+Way+Northeast,+Seattle,+Washington+98195,+United+States+of+America/@47.653273,-122.30605,19z) CSE 403| |**Date**|Monday, Nov 13, 2017| |**Time**|18:00hrs (6:00PM Pacific)| School is in session, so the doors should be unlocked! ## Meeting Agenda CTF talk by a member [Lean Coffee](http://leancoffee.org/) agendaless meeting format To be determined on day of meeting at the meeting. ### Presentations * CTF Talk ### Hacking * Learn how to hack or show your prowess! ### Projects * [JRSFuzz](https://www.altsci.com/jrsfuzz/) Dumb fuzzer for a dumb world * [Mechanical Phish](https://github.com/mechaphish) * [ChipWhisperer](https://github.com/newaetech/chipwhisperer) * [Seattle Infosec Calendar](http://seattle-infosec-calendar.com/) * [Radare](https://radare.org/r/) * Feel free to add your project here. ### Misc. Info * [Oct 9, 2017 Meeting information](/Seattle-2017-10-09) * [Sep 12, 2017 Meeting information](/Seattle-2017-09-12) * [Aug 8, 2017 Meeting information](/Seattle-2017-08-08) ## Meeting Minutes 4 people made the meeting. It's likely that weather, business, personal stuff, and lack of a reminder e-mail to the mailing list contributed to the very low attendance. We discussed many topics including: * TLS * How does TLS even work? * How does hashing work? * How does HMAC work? * How does HTTP work with TLS? * AES * AES 256 has a different [key schedule](https://en.wikipedia.org/wiki/Rijndael_key_schedule) than AES-128. * SMTP's weakness * Servers are not yet willing to refuse e-mail * A very good point: even with the same security choices as HTTPS, SMTP would still be untrustworthy if you or your recipient uses a public server (Gmail, Office, Tutanota, Lavabit, Mailinator, ProtonMail, Cock.li, etc) * This property of SMTP would be best illustrated with a CTF challenge. * It is the problem of being point-to-point encryption instead of end-to-end encryption. * How to get into security * Feel free to ask people for an informational interview. * Go to hacker events. * Read [Art of Software Security Assessment](https://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426) * Play CTFs and [read solutions afterward](https://ctftime.org/) * Hack. * Why do hackers like the EFF? * They are good lawyers. * They sue the government repeatedly over the warrantless wiretapping that continues to this day. * They defend hackers. * They improve the public perception of hackers. * There is a serious problem in every court room that there is a knowledge gap between computer programmers and the people who decide their fate (judge, jury, and lawyers). * Do we do hands on stuff? * Yes. We played Vortex 0 and Vortex 1 [two months ago](/Seattle-2017-09-12). * What events are like Neg9? * [Batman's Kitchen](https://uwctf.cs.washington.edu/) * [Hushcon](https://hushcon.com/) * [2600](https://2600.com/) * [SoDo MakerSpace](http://sodomakerspace.com/) * Harry's Bar on Thursdays * The people who worked at Equifax will probably have hard ever living that down * It's possible that they could have trouble finding work with that on their resume. * It's possible that people could give them a chance because it takes a really evil company to scapegoat a guy for a catastropic security failure. * In order to fail that badly you need to 1. Not know that the patch is critical 2. Have a security team that doesn't know that the patch is critical * That seems like a reasonable situation for those people, but reasonable is relative. ---- CategoryLocalMeetings
Preview