Welcome to BERKE1337, a group of computer security enthusiasts at UC Berkeley. We meet on a regular basis to organize, hack, defend, educate, and have fun.
We will be having our 2015 General Meeting on Tuesday, September 29th at 7PM in 405 Soda!
The team competes in the Western Regional Collegiate Cyber Defense Competition each year, in addition to a variety of smaller offensive security competitions. In our meetings we practice hands-on security in both offensive and defensive roles. Past practices have involved reversing custom-built Windows malware, setting up a network intrusion monitor with any Linux machine in less than 5 minutes, and cracking ciphers for security capture-the-flag competitions.
There is no required experience level to join us! If you're interested, join the mailing list so you'll get notified when we have events or practices.
BERKE1337 was originally founded as a team to compete in the Western Regional Cyber Defense Competition. Since its inception, the team has grown, but this competition is still one of BERKE1337's biggest events. In this competition, our team of eight is given a network of approximately 20 servers and workstations which must be secured against constant attack from a professional security team. Simultaneously, we must complete objectives given to us by the competition organizers, such as setting up new roles for servers or reconfiguring network topology.
NCCDC 2015: 2nd place
WRCCDC 2015: 1st place
NCCDC 2014: 5th place
WRCCDC 2014: 1st place
WRCCDC 2013: 2nd place
CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world. Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which can be useful in a CTF.
Throughout the year, BERKE1337 holds many workshops and practices so members can gain key knowledge in computer security. Workshops range in subject matter and skill level. Examples of past workshop topics include firewalls, malware, and intrusion detection systems.
All workshops are announced over the mailing list.
An incomplete list of some of our members.
Hacking computers since 1996. Expertise in network, web and software security. Also sometimes uses a soldering iron. Broke T-Mobile Wi-Fi Calling in 2013.
EECS student. Lead Information Security Engineer at UC Berkeley Student Affairs. Director of photography and design at UC Berkeley IEEE. Trombonist in the Cal Band.
We frequently get questions about how to get started in the field of cybersecurity. One of our goals is to help teach the field in our workshops and through competitions, but if you're looking for some extra material, here are some good resources:
Above all, the best way to learn security is by doing it. Read some of the above materials, find an attack or defense you'd like to try, set up a test environment (don't attack anyone else's stuff), and have at it!