Saturday September 19th is your DC404 virtual meeting
The DC404 Big Blue Button meeting space is graciously hosted by DC404 member npcomp.
Big Blue Button is a WebRTC based open source video teleconferencing platform supported by all major browsers, including Chrome, FireFox, Safari, and Safari Mobile. For best results on desktop and laptops, Chrome or Firefox is recommended. For Chromebooks the built-in Chrome browser is recommended.
The meeting space will open at 13:00 on Saturday so that people will have time to connect and work out any technical issues.
The meeting will start at 14:00.
No registration or email address is required, just enter your preferred handle. To join the meeting from your browser use this link:
Joe Gray will be presenting:
When we see the terms Natural Language Processing (NLP) or Machine Learning (ML), often, our guts are correct, and it is vendor marketing material, frequently containing FUD. After tinkering with various libraries in Python and R with the use of some OSINT and SOCMINT techniques, I have found a use for NLP and ML that is 100% FUD free in the form of a brand new, Python based tool.
In this presentation, which goes further than the previous DECEPTICON presentation, we address topics that I have frequently spoken about in past years is disinformation, deception, OSINT, and OPSEC. When working through learning NLP and ML in Python, it dawned on me: marry these technologies with DECEPTICON for good. Enter the DECEPTICON bot. The DECEPTICON bot is a python* based tool that connects to social media via APIs to read posts/tweets to determine patterns of posting intervals and content then takes over to autonomously post for the user. What is the application you ask: people who are trying to enhance their OPSEC and abandon social media accounts that have been targeted without setting off alarms to their adversaries. Use case scenarios include public figures, executives, and, most importantly – domestic violence and trafficking victims.
Joe Gray is a passionate OSINT Practitioner and Instructor. Currently employed as a Senior OSINT Specialist at QOMPLX, Joe also teaches a variety of Open Source Intelligence (OSINT) courses via The OSINTion. Joe is a frequent competitor in many OSINT-adjacent capture the flag (CTF) events. Notably as a solo competitor, Joe won the 2017 DerbyCon Social Engineering CTF (SECTF), placed 2nd in the HackFest SECTF (despite not speaking French), and 3rd Place in the NCPTF Missing Persons CTF. As a member of the Password Inspection Agency, Joe and the team won the TraceLabs OSINT Search Party during DEFCON 28, placed 2nd in the Global CTF before that, and have had many other successful outings in CTFs. Joe is the author of Practical Social Engineering due in February 2021 via NoStarch Press. Joe has contributed blogs to a variety of sources such as TripWire, IBM, Forbes, and Dark Reading. He is also the author of the tools WikiLeaker and the DECEPTICON Bot.
We will have time after the presentation for people to to share what they are working on. Your project doesn’t have to be complete and slides are not required (like show-n-tell).
We will be running the NetKotH CTF.
If you would like to play along in the CTF follow these instructions (http://koth.userserviceable.com/netkoth.html) and hack away with your favorite tools such as Kali Linux, Parrot Linux, or ArchStrike Linux.
More information about NetKotH can be found here:
Sorry, Atlanta LockSport will not be unable to host lock pick village hosted.
To find out more about Atlanta LockSport visit their web site at https://atlantalocksport.org/
You can sign up for the Atlanta LockSport email list and discord channel at https://atlantalocksport.org/contact.html
All ages/skill levels welcome. No dues, feel free to bring new friends.
Our Home page: https://dc404.org
DC404 Atlanta Cybersecurity Engineers Discord Server Channel
GENERAL -> dc404
Discord Invite Code: https://discord.gg/eHm7NnZ
Sign up for the chat/discussion list – it’s low traffic, keeps you in the loop, and enables you to communicate with the other DC404 folks:
IRC Channel: #dc404 chat.freenode.net