The HackMiami 2018 Hackers Conference seeks to bring together the brightest minds within the information security industry and the
digital underground. This conference will showcase cutting edge tools, techniques, and methodologies that are at the forefront of the global
The conference features a jam packed schedule of tracks that will appeal to both novice hackers and seasoned professionals.
HackMiami seeks to develop and harness the participation of the information security community through regular meetings,
presentations, labs and competitions. These events allow the hacker community a forum to present their research, develop new techniques
and methodologies, and at the same time provides valuable a networking resource for contracting opportunities.
A regular, featured speaker at ShmooCon, SOURCE Boston, DEF CON, RSA
and other marque conferences, Jack is widely considered a leading
technology community activist.
He is co-host of Security Weekly and
served as director of the National Information Security Group (NAISG).
He is co-founder of Security BSides, and his Uncommon Sense Security
blog has been named to the Security Bloggers Network Hall of Fame.
Current Position: As Strategist, Jack helps develop Tenable
SecurityCenter and provide valuable insight to consumers about current
Dr. Christopher Ahlberg, Ph.D. Co-founded
Recorded Future Inc. in 2009 and serves as its CEO
He was named among the World's Top 100 Young
Innovators by Technology Review, MIT's Magazine of Innovation, in
He has lectured and consulted extensively for industry,
academia, military and intelligence communities - as well as published
& lectured in computer science, psychology, linguistics, biology and
Dr. Ahlberg earned a Doctorate (Ph.D.) from Chalmers
University of Technology and has been a visiting researcher at the
University of Maryland.
By Shubham Mittal
The training will cover topics like unconventional search engines,
Social Media Intelligence (SOCMINT), automated data mining, metadata
extraction, data-dump harvesting, breach monitoring, Tor and much
more. Utilizing a variety of such techniques along with freely
available tools and services like DataSploit, Maltego, Foca, etc. as
well as tailored scripts, participants will perform real-life attack
scenarios. Training will not only cover these topics but will also go
in-depth on how OSINT techniques can be chained together and even a
small piece of information can lead to the catastrophic results for an
Bring a laptop
Register For Training
By Rod Soto
During this comprehensive course, tools and methodologies that are used during penetration tests in enterprise network environments will be detailed.The course will utilize a lab environment for a hands-on instruction of manual penetration testing methods, in addition to, training for use of exploitation frameworks, such as Metasploit. Focus will be geared towards methodology,processes, vectors, tools, and techniques used for exploitation. By the end ofthe course, the student will have an in-depth understanding of the underlying principals of network exploitation and will have gained experience in the successful execution of attacks.Minimum
Bring a Laptop with: 4 GB of RAM at Minimum and Quad-Core Processor at Minimum Ability to Run Virtual Machines
Understanding of Basic Networking Concepts
Basic Linux Comprehension
Register For Training
By Seth Wahle
An exhaustive one day bootcamp for the would be cryptocurrency miner. This course starts with the very basics of how cryptocurrencies work and equips you with the knowledge you need to start and run a cryptocurrency mining operation.
Bring a laptop
In this workshop the audience along with the instructor will build an Ethereum miner from step 0. The first part of the talk walks the audience through the different components that make a miner as well as share some places where to source them. Then during a live demonstration, a miner will be built.The second part of the workshop will focus on programming a mining operating system (ethOS) unto the miner. Programming covers the following subjects:
* Default and common configurations
* Overviews of current miners available
*Over clocking steps
* Finally start mining live!
In the final portion of the work shop the speaker connects the miner to a mining pool, and creates an Ethereum wallet where the coin mined can be stored.
Register for Conference
AWS Security workshop will demonstrate how to efficiently use AWS
security services to stay secure and compliant in the AWS Cloud. This
workshop will solely focus on common mistakes people do when using
Amazon Web Services (AWS). This session will cover how to fingerprint,
exploit and defend in AWS Cloud environment. Finally, it will show how
to automate your security in AWSenvironment.
Bio: (Shreyas Damle)
NYU Cybersecurity Graduate. Cloud Security Engineer at MobileIron.
Twitter Link: https://twitter.com/shreyas_rd
5101 Collins Avenue, Miami Beach, Florida, 33140, United States
Seacoast Suites is located on world-renowned Miami Beach, Minutes away from South Beach’s premier clubs & restaurants and premier Shopping to the north at The Shoppes at Bal Harbour and Aventura Mall. We are 15 minutes from the Performing Arts Center, American Airlines Arena, Bayside Marketplace and Downtown Miami. Explore Miami’s highlights; Jungle Island, The Florida Everglades or spend the afternoon shopping on Lincoln Road Mall or relax with a cocktail and tapas on historic Espanola Way.
This Hotel Features
Ocean Side Pool
Mini Spa Access
On Site Mini Market
Poolside Tiki Bar
Direct Beach Access and Private Beach-Side Area
24 hr. Valet Service
All Rooms Include
Iron and Ironing Board
Digital Satellite TV with HBO
Fully equipped Kitchen
International Telephone Service
HackMiami’s experienced information security professionals have years of experience working with large corporations, governments, and small businesses.
Our services are designed to assist individuals and businesses in the development of their skills and their security posture through the facilitation of cutting edge methodologies from both the attack and defense perspective.
Network and Application Vulnerability Assessments
Network and Application Penetration Testing
Physical Facility Security Assessments
Social Engineering Assessments
On-Site Training Seminars
HackMiami features an array of information security professionals available to speak at your corporate engagement or IT/IS conference on a variety of digital attack and defense concepts. Contact us now to ensure an early booking.
Enterprise Penetration Testing Methods
Open Source Intelligence for Penetration Testers
Security Engineering of IoT and Embedded Systems
Cryto Dojo Crytpocurrency training
Digital Crime Intelligence & Forensic Analysis