Your hackers yearning to build and break things.
We actually remembered the website exists! Happy 2020, and hope you made it to our first meeting of the year! This months meeting had lots of new and old faces. Missed us this time? See ya next time!
That’s right, we are ten years old. Still at Geekdom, still at the Events Centre, still the 6th at 6:30PM of every month.
mauvehed came down from Austin to give us an AHA! lesson and show us some physical security stuff. Sciatic demoed some TPM items in Windows I showed some ways to roll your own OTP system without Azure Rights Management (see: https://github.com/angelovescio/arms and http://theytookmyinterwebs.blogspot.com/2015/08/you-down-with-otp-you-know-me-how-to.html) Also, we moved the SAHA! schedule so pay attention to the dates […]
So we packed the house for the Hackers screening, The only reason there were two seats left was because 2 people got the night screwed up. MISSION ACCOMPLISHED.
Here are the SAHA!-affiliated blogs: https://scriptjunkie.us
If you are on the mailing list, you have until July 12th to nominate yourself or someone else to be our social media person. The media-person will be doing the twitters, notices, and featured speaker scheduling. They may also do some A/V tasks related to some podcast notions we have had lately…undecided on that last […]
If you want to make the list for fire/turbo talks, the rule is first come is first served. Send an email to the BSidesSATX organizers, me, or tweet with a hashtag #BsidesSATX to get on the list. The whole thing is only an hour long, with a very captive audience (lunch is served there). Talks […]
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Show hidden characters [StructLayout(LayoutKind.Sequential, Pack = 0)] public struct IO_STATUS_BLOCK { public uint status; public IntPtr information; […]
Go to this page to extract all the info you need to start cracking dem hashes. http://ntdsd.it/