Join us for a full blown meeting in December! What?? That’s right! Not just a social for this December meeting!! We’ll have two speakers presenting on reverse engineering and malware!!
WHERE: Knuckleheads Garage - 701 North Montgall Avenue, Kansas City, MO 64120 United States
If you haven’t been to Knuckleheads or want to make sure you’re not stuck on the wrong side of the train, check out the venue info page!
Grand Emcee: @jur1st
5:00 - 6:00 Make excuses / pre-drinking
6:00 - 6:25 SecKC 101 / announcements / Welcome to SecKC - @sysaaron / @hevnsnt ranting about various things, we should all be afraid tbh
6:30 - 6:40 Open source news briefing - @net_code
6:45 - 7:30 Learning to Learn Software Reverse Engineering - Dr. Wesley McGrew
7:45 - 8:30 Evidence in Motion: Mapping Dynamic Web Malware Through Choke Points and Decentralized Payloads - Andrew Northern
Modern web-delivered malware changes fast, but its behavior doesn’t. This talk breaks down how large Fake Captcha, Click-Fix, and EtherHiding ecosystems reuse the same JavaScript choke points and decentralized payload mechanisms even as their domains churn. I show how these stable code paths, combined with Steam and Telegram–based C2 brokers, create a clear map of actor infrastructure hiding inside a chaotic redirect landscape. Attendees learn how to pivot on the logic attackers cannot change, expose entire malware campaigns, and hunt dynamic web threats with far higher precision.
8:30 - ??? Mad Beatz