Guild Night
27 Episodes
Each week we bring in a guest speaker to give a talk to the guild. Red Team, Blue Team, Purple Team, Compliance, and Executive style talks. Whether we are diving into Metasploit or building an SDR Basestation with Raspberry Pi. We are always pushing the boundaries of the first cybersecurity guild of its kind.
-
YOUR COMPLIANCE SUCKS, BECAUSE ACTUAL SECURITY IS BETTER
Episode 11
The Cybersecurity Maturity Model Certification (CMMC) is the new cybersecurity "super standard" finalized this January, which requires third-party auditing and certification for those that want to do business with the Department of Defense (DoD). It organizes and brings together existing worldwi...
-
1:38:42Episode 10
TOO SMART FOR THE FRONTLINES
Episode 10
Patsy was the second person to do the Live Stream. In this talk, he detailed the fundamentals of the famous network mapping tool Nmap! No matter if you're a Red team or Blue the first step in any security engagement is to identify what's on your target network. Review the fundamentals of host enu...
-
1:53:17Episode 1
Sploits "R" Us
Episode 1
Deep dives into Metasploit modules, functionality, and attacks with Zoran “theclevershark” Jovic. Whether you are learning how to pwn your first box or a seasoned pro, everyone will be exploited!
-
1:16:46Episode 17
HACKING HTTP REQUESTS WITH POSTMAN
Episode 17
Join Ty "Tymito" Lieu on 4/16 @6pm during The Undercroft Live Stream of “Hacking HTTP Requests with Postman”
Learn about the HTTP protocol that powers how we talk to the Internet! Understand the different types of methods and status codes that come with HTTP and learn how to hack websites lik...
-
1:55:07Episode 14
PA$$WORD101: AN EVENING OF SECRET SHARING
Episode 14
Zoran “CleverShark” Jovic broadcasts over The Undercroft Live Stream. Our discussion will be about all things password authentication: best practices, brute force, password spraying, wordlists, rainbow tables and learn how to perform and defend against password attacks.
-
1:49:32Episode 12
LA SERPIENTA DE CIUDAD YBOR
Episode 12
In the dark streets of Ybor, amid the sweet Latin music, there crawls a serpent hungry for web code... Learn web scraping using python and how to use Python to collect the information you need on the prey you hunt. Employ small templates to do your bidding and scrape different things, like HTML o...
-
1:19:24Episode 7
RASPBERRY PI, FROM GARDEN TO TABLE
Episode 7
In this talk, Farmer Aces is going to discuss the Raspberry Pi platform and how to grow your Raspberry Pi farm, starting from seed (Noobs), to sprout (Raspbian) to a garden variety of IoT devices and solutions. To follow along during the talk and to build some of the IoT solutions afterward, it i...
-
YOUR PERSONAL CLOUD: OWNCLOUD ON RASPBERRY PI
Episode 6
Would you like to ditch Dropbox, opt-out of OneDrive, and ignore iCloud? You can create your own personal cloud storage device with a Raspberry Pi, an external hard drive, and FOSS software called ownCloud. Walkthrough installation and configuration of your own cloud storage server as well as des...
-
1:39:10Episode 18
EINSTEIN'S THEORY OF AD BLOCKING
Episode 18
Not even ads can escape the Event Horizon. Follow along with "AK" (with help from Uncle Nestor(N3S)!) on 5/21 @ 6 PM as he demonstrates setup and configuration of a Raspberry Pi, as a one-stop-shop for network-wide ad blocking and recursive DNS resolution, utilizing Pi-hole & Unbound. This talk w...
-
MAKE YOUR OWN RASPBERRY PI CASE IN FUSION 360
Episode 15
UC Guild members and members of Tampa Hackerspace, learn how to make an enclosure for raspberry pi. Using Fusion 360. John “Grumpy Gus” Hildebrand will illustrate one possible way to create a custom enclosure for a PCB board. It doesn't have to be an RPI these techniques can be translated for an...
-
PLAY ALL THE GAMES - RPI EMULATOR FROM SCRATCH
Episode 13
Do you miss playing on classic Nintendo and Sega systems? Don't know what happened to your old Atari sold in the garage sale? Well, look no further as 2020 Guild Master Jon Singer teaches this one simple trick, you can start conquering your favorite games all over again, without having to blow in...
-
2:32:57Episode 20
DON'T DIE IN THE WOODS
Episode 20
c0unt z3r0 has spent the majority of his life not dying. He hasn't died in South America, he hasn't died in the Middle East, and he hasn't died in many woodland environments. Join him live and in-person as he goes over survival basics, the end of the world, and the psychological values of hunting...
-
2:03:13Episode 2
TODAY'S TOM SAWYER
Episode 2
In this presentation, Cam from 0Sum Club will highlight global trends that threaten our individual 'information freedoms', and present specific strategies and techniques to fight the dying of the light, because trust us: it's coming!
-
1:37:55Episode 9
Taking Control
Episode 9
This talk is intended to be a primer on Industrial Control systems. TreyCraf7 will cover common components, define systems and architecture, discuss communication mediums and protocols, and take a look at the world of protecting ICS. We will also discuss how these systems affect us and society, f...
-
HOW I HACKED THE ARRL TECHNICIAN EXAM AND WHAT I'VE LEARNED SINCE
Episode 24
Adam "w0din" Sheffield & 2021 guild Master "Dr.Goon" demonstrate how one can quickly study and pass the ARRL Technician examination in less than two weeks, from your toilet. I learn from doing, not through books so the goal is to provide a framework to get all members that want to be licensed, li...
-
"THE PITCH" -DON'T STRIKE OUT DURING THE BRIEFING
Episode 8
Whether we are seeking a budget increase from our CISO’s or expanding our client base, at some point in our careers we will face it…” the Pitch.” Putting ourselves out there in any way is terrifying, and we fear any rejection as a reflection of our abilities. We’ll look at pro tips to overcome ...
-
30:38Episode 19
A FIREWALL AGAINST YOUR DEMONS
Episode 19
A FIREWALL AGAINST YOUR DEMONS ACHIEVING A HACKERS MINDSET IN A UNCERTAIN WORLD
-
1:42:25Episode 3
DEFENDING THE CYBER KILL CHAIN
Episode 3
"Crispy" Talks about the steps attackers use along the way of their attack and give insight into how to prevent or detect their steps and process
-
COUNTERING THE CYBER THREAT TO CRITICAL INFRASTRUCTURE
Episode 5
Hardening U.S. critical infrastructure sectors against network attacks and vulnerabilities is a national security priority, but a comprehensive plan of action remains elusive. The key to meeting this challenge is forging a national consensus on roles and missions within government and between gov...
-
MAKING CYBER THREAT INTEL (CTI) ACTIONABLE: AT MACHINE SPEED
Episode 21
A conceptual architecture (not a sales pitch/tech agnostic) to address two key concepts: First to bring external CTI (Cyber Threat Intel) into your environment (security infrastructure) and converting it into a machine-actionable format. Second, to set up sensors and instrumentation to match even...
-
54:28Episode 23
ESCAPING THE CREATIVE GRIND
Episode 23
We will take a look into the creative process from Undercroft Co-Founder Chris Machowski’s perspective. Just like most projects, there is a specific workflow and method to the madness. We will touch on digital artwork and video editing.
-
BUILDING A SDR BASE STATION WITH RASPBERRY PI
Episode 4
Now that you have your shiny new Raspberry Pi, you may be asking yourself “what can I do with this thing?” Jonathan last spoke about making an emulation box to play all of your favorite classic games from yesteryear, but now he is back with a new project. Welcome to the Software-Defined Radio, on...
-
INTRODUCTION TO REVERSE ENGINEERING AND MALWARE ANALYSIS
Episode 25
Dr. Bill Gauvin gives the first in a series on this topic. In this session, viewers are introduced to the Portable Executable (PE) file format as it relates to RE and malware analysis. Tools, such as Strings, PEview, Ghidra, and the Windows Visual Studio debugger are introduced to allow the viewe...
-
1:11:27Episode 22
ASYMMETRIC CRYPTO FOR A GRUNT
Episode 22
"Excrucio" talks RSA cryptography, a general history, the math behind it, and 2 labs. including (1)SSH keys and (2)using a hex editor.