Guild Night

Guild Night

27 Episodes

Each week we bring in a guest speaker to give a talk to the guild. Red Team, Blue Team, Purple Team, Compliance, and Executive style talks. Whether we are diving into Metasploit or building an SDR Basestation with Raspberry Pi. We are always pushing the boundaries of the first cybersecurity guild of its kind.

Subscribe Share
Guild Night
  • YOUR COMPLIANCE SUCKS, BECAUSE ACTUAL SECURITY IS BETTER

    Episode 11

    The Cybersecurity Maturity Model Certification (CMMC) is the new cybersecurity "super standard" finalized this January, which requires third-party auditing and certification for those that want to do business with the Department of Defense (DoD). It organizes and brings together existing worldwi...

  • TOO SMART FOR THE FRONTLINES

    Episode 10

    Patsy was the second person to do the Live Stream. In this talk, he detailed the fundamentals of the famous network mapping tool Nmap! No matter if you're a Red team or Blue the first step in any security engagement is to identify what's on your target network. Review the fundamentals of host enu...

  • Sploits "R" Us

    Episode 1

    Deep dives into Metasploit modules, functionality, and attacks with Zoran “theclevershark” Jovic. Whether you are learning how to pwn your first box or a seasoned pro, everyone will be exploited!

  • HACKING HTTP REQUESTS WITH POSTMAN

    Episode 17

    Join Ty "Tymito" Lieu on 4/16 @6pm during The Undercroft Live Stream of “Hacking HTTP Requests with Postman”

    Learn about the HTTP protocol that powers how we talk to the Internet! Understand the different types of methods and status codes that come with HTTP and learn how to hack websites lik...

  • PA$$WORD101: AN EVENING OF SECRET SHARING

    Episode 14

    Zoran “CleverShark” Jovic broadcasts over The Undercroft Live Stream. Our discussion will be about all things password authentication: best practices, brute force, password spraying, wordlists, rainbow tables and learn how to perform and defend against password attacks.

  • LA SERPIENTA DE CIUDAD YBOR

    Episode 12

    In the dark streets of Ybor, amid the sweet Latin music, there crawls a serpent hungry for web code... Learn web scraping using python and how to use Python to collect the information you need on the prey you hunt. Employ small templates to do your bidding and scrape different things, like HTML o...

  • RASPBERRY PI, FROM GARDEN TO TABLE

    Episode 7

    In this talk, Farmer Aces is going to discuss the Raspberry Pi platform and how to grow your Raspberry Pi farm, starting from seed (Noobs), to sprout (Raspbian) to a garden variety of IoT devices and solutions. To follow along during the talk and to build some of the IoT solutions afterward, it i...

  • YOUR PERSONAL CLOUD: OWNCLOUD ON RASPBERRY PI

    Episode 6

    Would you like to ditch Dropbox, opt-out of OneDrive, and ignore iCloud? You can create your own personal cloud storage device with a Raspberry Pi, an external hard drive, and FOSS software called ownCloud. Walkthrough installation and configuration of your own cloud storage server as well as des...

  • EINSTEIN'S THEORY OF AD BLOCKING

    Episode 18

    Not even ads can escape the Event Horizon. Follow along with "AK" (with help from Uncle Nestor(N3S)!) on 5/21 @ 6 PM as he demonstrates setup and configuration of a Raspberry Pi, as a one-stop-shop for network-wide ad blocking and recursive DNS resolution, utilizing Pi-hole & Unbound. This talk w...

  • MAKE YOUR OWN RASPBERRY PI CASE IN FUSION 360

    Episode 15

    UC Guild members and members of Tampa Hackerspace, learn how to make an enclosure for raspberry pi. Using Fusion 360. John “Grumpy Gus” Hildebrand will illustrate one possible way to create a custom enclosure for a PCB board. It doesn't have to be an RPI these techniques can be translated for an...

  • PLAY ALL THE GAMES - RPI EMULATOR FROM SCRATCH

    Episode 13

    Do you miss playing on classic Nintendo and Sega systems? Don't know what happened to your old Atari sold in the garage sale? Well, look no further as 2020 Guild Master Jon Singer teaches this one simple trick, you can start conquering your favorite games all over again, without having to blow in...

  • DON'T DIE IN THE WOODS

    Episode 20

    c0unt z3r0 has spent the majority of his life not dying. He hasn't died in South America, he hasn't died in the Middle East, and he hasn't died in many woodland environments. Join him live and in-person as he goes over survival basics, the end of the world, and the psychological values of hunting...

  • TODAY'S TOM SAWYER

    Episode 2

    In this presentation, Cam from 0Sum Club will highlight global trends that threaten our individual 'information freedoms', and present specific strategies and techniques to fight the dying of the light, because trust us: it's coming!

  • Taking Control

    Episode 9

    This talk is intended to be a primer on Industrial Control systems. TreyCraf7 will cover common components, define systems and architecture, discuss communication mediums and protocols, and take a look at the world of protecting ICS. We will also discuss how these systems affect us and society, f...

  • HOW I HACKED THE ARRL TECHNICIAN EXAM AND WHAT I'VE LEARNED SINCE

    Episode 24

    Adam "w0din" Sheffield & 2021 guild Master "Dr.Goon" demonstrate how one can quickly study and pass the ARRL Technician examination in less than two weeks, from your toilet. I learn from doing, not through books so the goal is to provide a framework to get all members that want to be licensed, li...

  • "THE PITCH" -DON'T STRIKE OUT DURING THE BRIEFING

    Episode 8

    Whether we are seeking a budget increase from our CISO’s or expanding our client base, at some point in our careers we will face it…” the Pitch.” Putting ourselves out there in any way is terrifying, and we fear any rejection as a reflection of our abilities. We’ll look at pro tips to overcome ...

  • A FIREWALL AGAINST YOUR DEMONS

    Episode 19

    A FIREWALL AGAINST YOUR DEMONS ACHIEVING A HACKERS MINDSET IN A UNCERTAIN WORLD

  • DEFENDING THE CYBER KILL CHAIN

    Episode 3

    "Crispy" Talks about the steps attackers use along the way of their attack and give insight into how to prevent or detect their steps and process

  • COUNTERING THE CYBER THREAT TO CRITICAL INFRASTRUCTURE

    Episode 5

    Hardening U.S. critical infrastructure sectors against network attacks and vulnerabilities is a national security priority, but a comprehensive plan of action remains elusive. The key to meeting this challenge is forging a national consensus on roles and missions within government and between gov...

  • MAKING CYBER THREAT INTEL (CTI) ACTIONABLE: AT MACHINE SPEED

    Episode 21

    A conceptual architecture (not a sales pitch/tech agnostic) to address two key concepts: First to bring external CTI (Cyber Threat Intel) into your environment (security infrastructure) and converting it into a machine-actionable format. Second, to set up sensors and instrumentation to match even...

  • ESCAPING THE CREATIVE GRIND

    Episode 23

    We will take a look into the creative process from Undercroft Co-Founder Chris Machowski’s perspective. Just like most projects, there is a specific workflow and method to the madness. We will touch on digital artwork and video editing.

  • BUILDING A SDR BASE STATION WITH RASPBERRY PI

    Episode 4

    Now that you have your shiny new Raspberry Pi, you may be asking yourself “what can I do with this thing?” Jonathan last spoke about making an emulation box to play all of your favorite classic games from yesteryear, but now he is back with a new project. Welcome to the Software-Defined Radio, on...

  • INTRODUCTION TO REVERSE ENGINEERING AND MALWARE ANALYSIS

    Episode 25

    Dr. Bill Gauvin gives the first in a series on this topic. In this session, viewers are introduced to the Portable Executable (PE) file format as it relates to RE and malware analysis. Tools, such as Strings, PEview, Ghidra, and the Windows Visual Studio debugger are introduced to allow the viewe...

  • ASYMMETRIC CRYPTO FOR A GRUNT

    Episode 22

    "Excrucio" talks RSA cryptography, a general history, the math behind it, and 2 labs. including (1)SSH keys and (2)using a hex editor.