3. Local Resources
● NTXISSA – https://ntxissa.org
– 3rd Thursday
● Ft. Worth ISSA – https://www.issafortworth.org/
– 2nd Tuesday
● NTXCSG – https://www.meetup.com/NTXCSG/
– Last Thursday
● DC214 – http://dc214.org/
– 2nd Wednesday
● Hack FtW – http://hackftw.com/
– See DFW InfoSec Calendar (@DFW_InfoSec)
4. Local Resources
● Dallas Hackers Association (DHA)
– 1st Wednesday @ Family Karaoke (http://familykaraokedfw.com/)
– https://dallashackers.com/
– Meetup: Dallas-Hackers-Association
– Twitter: @Dallas_Hackers
● DHA Capture the Flag (CTF)
– Commander (@c0mmand3rOpSec)
– Prevade Cybersecurity (https://www.prevade.com/)
● DHA Lockpick Village
– Moe Bius (@RadlyRedundant)
5. Match the Attacker to the Weapon
(Analogy)
1) n00bs!
2) Script Kiddies
3) L33t Hax0rs
4) Hacktivists
5) Professionals
6) Criminals
7) APTs/Nation States
A) ICBM
B) Pea Shooter
C) IED
D) Hammer
E) Machine Gun
F) Pistol
G) Sarin Gas
11. Hardware
● Simplicity
● Redundancy
● Exploitation practice and development
– Hardware only equipment
– IoT
● Virtualization considerations
– Full virtualization vs. paravirtualization (VT-x/AMD-V)
– Storage
– Memory
– CPU cores