<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BCDYXL@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BCDYXL</pentabarf:event-slug>
            <pentabarf:title>WELCOME CEREMONY</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T091500</dtstart>
            <dtend>20250428T093000</dtend>
            <duration>0.01500</duration>
            <summary>WELCOME CEREMONY</summary>
            <description>WELCOME CEREMONY</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BCDYXL/</url>
            <location>MAIN TRACK</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZADCW7@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZADCW7</pentabarf:event-slug>
            <pentabarf:title>KEYNOTE</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T093000</dtstart>
            <dtend>20250428T100000</dtend>
            <duration>0.03000</duration>
            <summary>KEYNOTE</summary>
            <description>OPENING KEYNOTE</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/ZADCW7/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Malcolm Harkins</attendee>
            
            <attendee>Eoin Wickens</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XEVY8W@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XEVY8W</pentabarf:event-slug>
            <pentabarf:title>From pocket to Pwn: How we hacked a multinational corporation for $200 with just what’s in our pockets (and theirs)</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T100000</dtstart>
            <dtend>20250428T104500</dtend>
            <duration>0.04500</duration>
            <summary>From pocket to Pwn: How we hacked a multinational corporation for $200 with just what’s in our pockets (and theirs)</summary>
            <description>When Red Teaming a multinational technology company with an extensive security budget we had to think outside the box in order to leverage new attack pathways to gain a foothold in their environment where typical Red Teaming methodologies simply weren’t viable.

Using readily available hardware and almost no code, we were able to abuse both application protocols and inbuilt applications to gain persistent access via a chained attack across multiple devices to gain system level access to a customer environment.

This talk will focus on a modified real world scenario which included:

Denial of BlueTooth service (conceptual due to legal implications)
Wireless BadUSB
Modified Metasploit for Android
Abuse of Android Debugging Tool (ADB) to gain persistent reverse shell over Mobile Service (not USB)
Abuse of ADB for real time screen recording and interaction
Network enumeration via ADB
Using ADB as a pivot for further compromise of the environment
Exfiltration of VPN configuration and subsequent abuse of MFA
Undetectable data exfiltration via mobile service

This talk highlights how devastating attacks are still easily possible with a very low price entry point and virtually undetectable by most Security Tools. This talk will feature a live demo (if the demo gods deem it so) and aim to encourage aspiring penetration testers to think outside of the (Windows) box when approaching their objectives.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/XEVY8W/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Tim Shipp</attendee>
            
            <attendee>Lisa Landau</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VHU3FS@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VHU3FS</pentabarf:event-slug>
            <pentabarf:title>Adversarial Intelligence: Redefining Application Security through the eyes of an attacker</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T104500</dtstart>
            <dtend>20250428T113000</dtend>
            <duration>0.04500</duration>
            <summary>Adversarial Intelligence: Redefining Application Security through the eyes of an attacker</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VHU3FS/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Aviv Mussinger</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RJBHD8@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RJBHD8</pentabarf:event-slug>
            <pentabarf:title>Netsec is dead(?): Modern Network Fingerprinting for Real-World Defense</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T113000</dtstart>
            <dtend>20250428T121500</dtend>
            <duration>0.04500</duration>
            <summary>Netsec is dead(?): Modern Network Fingerprinting for Real-World Defense</summary>
            <description>Network reconnaissance is often overshadowed by other threats, like phishing, yet it remains a critical first step in the kill chain. Because edge infrastructure is typically exposed around the clock, adversaries have a 24/7 opportunity to gather information and use it for initial exploitation. 
In this talk, we’ll trace the evolution of network fingerprinting, starting with traditional methods like p0f, which relied on passive TCP/IP signature analysis, and advancing to modern suits (JA4, JA4+, MuonFP). By walking through each generation of fingerprinting, I’ll show how visibility has expanded along with the trade-offs and limitations inherent in these methods.

I’ll present real-world scenarios that highlight how to spot fast scanners indexing massive numbers of hosts, how to detect covert traffic routed via jump boxes and VPNs, and how to block lower-level banner-grabbers. We’ll also discuss how these fingerprints can be integrated into SOC workflows, from building prioritized alerts to automating responses in firewalls and IDS.

Finally, we’ll wrap up with a practical checklist of tools, including Arkime and eBPF-based detection, as well as firewall rule approaches to immediately strengthen defenses. Attendees will leave with the knowledge and resources to apply modern fingerprinting for continuous monitoring, streamlined threat hunting, and reduced exposure to both mass and targeted network scans.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RJBHD8/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Vlad Iliushin</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3ZM9CY@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3ZM9CY</pentabarf:event-slug>
            <pentabarf:title>Beyond Detection: Building a Living Security Knowledge Ecosystem with SNARF</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T121500</dtstart>
            <dtend>20250428T130000</dtend>
            <duration>0.04500</duration>
            <summary>Beyond Detection: Building a Living Security Knowledge Ecosystem with SNARF</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/3ZM9CY/</url>
            <location>MAIN TRACK</location>
            
            <attendee>John Owen</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QNZ3XY@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QNZ3XY</pentabarf:event-slug>
            <pentabarf:title>KEYNOTE</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T130000</dtstart>
            <dtend>20250428T133000</dtend>
            <duration>0.03000</duration>
            <summary>KEYNOTE</summary>
            <description>KEYNOTE</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QNZ3XY/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Jake Williams (aka MalwareJake)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HVWUVF@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HVWUVF</pentabarf:event-slug>
            <pentabarf:title>Breaking Down Silos: Unify Assets, Minimize Attack Exposure</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T133000</dtstart>
            <dtend>20250428T140000</dtend>
            <duration>0.03000</duration>
            <summary>Breaking Down Silos: Unify Assets, Minimize Attack Exposure</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/HVWUVF/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Lucas Zaichkowsky</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SC9GX8@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SC9GX8</pentabarf:event-slug>
            <pentabarf:title>SAST AI</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T140000</dtstart>
            <dtend>20250428T144500</dtend>
            <duration>0.04500</duration>
            <summary>SAST AI</summary>
            <description>Will discuss deeply what is SAST is.
(Static Application Security Testing) and how using AI and pattern matching find source code vulnerabilities.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SC9GX8/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Bogdan Barchuk</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LYFTBR@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LYFTBR</pentabarf:event-slug>
            <pentabarf:title>Exploitation Techniques in APIs: RESTful, SOAP ,GraphQL and gRPC,</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T144500</dtstart>
            <dtend>20250428T153000</dtend>
            <duration>0.04500</duration>
            <summary>Exploitation Techniques in APIs: RESTful, SOAP ,GraphQL and gRPC,</summary>
            <description>This talk will explore key attack and exploitation techniques for RESTful, SOAP, GraphQL, and gRPC APIs, based on the OWASP API Security Top 10 framework. We&#x27;ll cover practical methods to identify and exploit vulnerabilities such as injection flaws, broken authentication, and data exposure. The focus will be on real-world attack scenarios using tools like Burp Suite and custom scripts.

We&#x27;ll dive into specific vulnerabilities for each API type: manipulating RESTful tokens, exploiting GraphQL query injection, compromising gRPC protobuf-based requests, and executing XML external entity (XXE) attacks on SOAP. The session will provide step-by-step demonstrations of these techniques, highlighting how to chain them for maximum impact.

Finally, we&#x27;ll discuss the Open-Sec framework and how to apply it to API penetration testing. This structured approach—covering reconnaissance, scanning, testing, and analysis—will help identify and exploit complex vulnerabilities, offering actionable insights to improve API security.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LYFTBR/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Toshiro Nagata Bolivar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9NBABQ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9NBABQ</pentabarf:event-slug>
            <pentabarf:title>Rules Writers and Threat Hunters in the Age of AI</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T153000</dtstart>
            <dtend>20250428T160000</dtend>
            <duration>0.03000</duration>
            <summary>Rules Writers and Threat Hunters in the Age of AI</summary>
            <description>To Be Determined</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/9NBABQ/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Eric Zietlow</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>J9FZJB@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-J9FZJB</pentabarf:event-slug>
            <pentabarf:title>Beyond SAST: Advancing Vulnerability Detection with Symbolic Execution</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T160000</dtstart>
            <dtend>20250428T164500</dtend>
            <duration>0.04500</duration>
            <summary>Beyond SAST: Advancing Vulnerability Detection with Symbolic Execution</summary>
            <description>Static Application Security Testing (SAST) is a vital tool for securing software, but its limitations, such as difficulty handling complex inputs, runtime behaviors, and dynamic data, can lead to missed vulnerabilities and false positives. This session explores these challenges and introduces symbolic execution, enhanced with artificial intelligence, as a game-changing solution. Symbolic execution goes beyond traditional static analysis by simulating all possible execution paths of a program, abstracting inputs symbolically to uncover hidden vulnerabilities like race conditions, memory safety violations, and edge case errors. We’ll also discuss the limitations of symbolic execution, such as path explosion, and strategies to mitigate them.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/J9FZJB/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Ulrich Lang</attendee>
            
            <attendee>Jason Kramer</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VVD73L@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VVD73L</pentabarf:event-slug>
            <pentabarf:title>GameHacking 101</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T164500</dtstart>
            <dtend>20250428T171500</dtend>
            <duration>0.03000</duration>
            <summary>GameHacking 101</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VVD73L/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Julian Dunning</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QLZMKV@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QLZMKV</pentabarf:event-slug>
            <pentabarf:title>KEYNOTE</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T171500</dtstart>
            <dtend>20250428T174500</dtend>
            <duration>0.03000</duration>
            <summary>KEYNOTE</summary>
            <description>CLOSING KEYNOTE</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QLZMKV/</url>
            <location>MAIN TRACK</location>
            
            <attendee>Sunil Gottumukkala</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>M78KTL@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-M78KTL</pentabarf:event-slug>
            <pentabarf:title>CLOSING CEREMONY</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T174500</dtstart>
            <dtend>20250428T180500</dtend>
            <duration>0.02000</duration>
            <summary>CLOSING CEREMONY</summary>
            <description>CLOSING CEREMONY</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/M78KTL/</url>
            <location>MAIN TRACK</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SH8SWT@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SH8SWT</pentabarf:event-slug>
            <pentabarf:title>Attacking AI</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T100000</dtstart>
            <dtend>20250428T120000</dtend>
            <duration>2.00000</duration>
            <summary>Attacking AI</summary>
            <description>While most AI assessment material focuses on academic AI red team content, “Attacking AI” is focused on the task of assessing AI enabled systems. 

Join Jason as he discusses his seven point methodology to assessing these systems and releases Arcanum’s prompt injection taxonomy and other resources for aspiring testers.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SH8SWT/</url>
            <location>TRACK 2</location>
            
            <attendee>Jason Haddix</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WAUNKX@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WAUNKX</pentabarf:event-slug>
            <pentabarf:title>Vulnerability Exploitation in the Cloud: A Cross-Platform Graph-Based Attack</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T120000</dtstart>
            <dtend>20250428T124500</dtend>
            <duration>0.04500</duration>
            <summary>Vulnerability Exploitation in the Cloud: A Cross-Platform Graph-Based Attack</summary>
            <description>During this talk I intended to cover this:

- Welcome - 
- What is HVT - 
- Difference between Attack Vector and Attack Path -
- What is Chock Point 
- AWS IAM - 
- AWS Attacks ( Explanation and Demo) -
   - Attack Methods
   - CreatePolicyVersion
   - Attaching Attack
- Conclusions</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/WAUNKX/</url>
            <location>TRACK 2</location>
            
            <attendee>Filipi Pires</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BGTZW8@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BGTZW8</pentabarf:event-slug>
            <pentabarf:title>Layered Security for Kubernetes</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T124500</dtstart>
            <dtend>20250428T131500</dtend>
            <duration>0.03000</duration>
            <summary>Layered Security for Kubernetes</summary>
            <description>Security for Kubernetes</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BGTZW8/</url>
            <location>TRACK 2</location>
            
            <attendee>Brian Six</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RXUVVC@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RXUVVC</pentabarf:event-slug>
            <pentabarf:title>Tabletop War Gaming</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T131500</dtstart>
            <dtend>20250428T151500</dtend>
            <duration>2.00000</duration>
            <summary>Tabletop War Gaming</summary>
            <description>Tabletop War Gaming brought to you by Google - Mandiant</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RXUVVC/</url>
            <location>TRACK 2</location>
            
            <attendee>Mike Lombardi</attendee>
            
            <attendee>Erik Barzdukas</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LXBZF8@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LXBZF8</pentabarf:event-slug>
            <pentabarf:title>Devops and threat research walk into a bar...</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T151500</dtstart>
            <dtend>20250428T154500</dtend>
            <duration>0.03000</duration>
            <summary>Devops and threat research walk into a bar...</summary>
            <description>In my presentation, I&#x27;ll discuss how we&#x27;ve integrated CI/CD pipelines to automate the deployment of both low and high-interaction honeypots. By tailoring these honeypots to mirror our customers&#x27; technology stacks, we&#x27;ve been able to gather more relevant threat data. I&#x27;ll explain how we&#x27;ve used HASH (https://github.com/DataDog/HASH) to quickly deploy low-interaction honeypots and delve into how container technology allows us to deploy high-interaction honeypots capable of running any technology stack. Additionally, I&#x27;ll highlight how the data we collect enhances our understanding of threats and enriches our customers&#x27; logs with valuable security insights. Our approach stands out because it combines DevOps methodologies with cybersecurity practices to create a dynamic and responsive honeypot deployment system. By integrating CI/CD pipelines, we&#x27;re able to respond rapidly to emerging threats, deploying honeypots in real-time as new vulnerabilities surface. We customize these honeypots to reflect our customers&#x27; actual environments, making the data we collect more relevant. This integration also streamlines the entire process from deployment to data analysis, reducing manual effort and minimizing potential errors. I&#x27;ll share recent case studies to illustrate the effectiveness of our approach. For example, I&#x27;ll talk about how we quickly deployed honeypots to capture exploit attempts on a newly discovered Confluence vulnerabilities, Docker API exploitation, Log4J, and Redis exploitation. I&#x27;ll also discuss how our high-interaction honeypots allowed us to monitor attackers&#x27; behavior after they gained initial access. Additionally, I&#x27;ll highlight instances where the intelligence we gathered significantly improved our customers&#x27; ability to detect and respond to threats. These real-world examples will demonstrate the impact of our methods.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LXBZF8/</url>
            <location>TRACK 2</location>
            
            <attendee>Andy Giron</attendee>
            
            <attendee>Arthi Nagarajan</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>UYWEQQ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-UYWEQQ</pentabarf:event-slug>
            <pentabarf:title>Securing Critical Infrastructure</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T154500</dtstart>
            <dtend>20250428T174500</dtend>
            <duration>2.00000</duration>
            <summary>Securing Critical Infrastructure</summary>
            <description>The workshop is structured as a CTF competition.  There will be demonstrations of the techniques, and help on the challenges will be available.

We will use Modbus and DNP networks, as well as normal IP-based networks.  Software used includes OpenPLC, FactoryIO, Splunk, Velociraptor, and Zeek.

Participants need a laptop capable of running virtual machines, or a few dollars to rent cloud servers.

All class materials are freely available on the Web and may be easily used in other classes.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/UYWEQQ/</url>
            <location>TRACK 2</location>
            
            <attendee>Sam Bowne</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>JZAJRB@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-JZAJRB</pentabarf:event-slug>
            <pentabarf:title>Soldering Village</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250428T100000</dtstart>
            <dtend>20250428T170000</dtend>
            <duration>7.00000</duration>
            <summary>Soldering Village</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Village</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/JZAJRB/</url>
            <location>SOLDERING VILLAGE</location>
            
            <attendee>Abhinav Pandagale</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
