<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.3.1. -->
<schedule>
    <generator name="pretalx" version="2024.3.1" />
    <version>0.23</version>
    <conference>
        <title>HackTheBay 2.0</title>
        <acronym>hackthebay-2025</acronym>
        <start>2025-04-28</start>
        <end>2025-04-28</end>
        <days>1</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.pacifichackers.com</base_url>
        <logo>https://cfp.pacifichackers.com/media/hackthebay-2025/img/LogoBanner-10_koWzePv.png</logo>
        <time_zone_name>America/Los_Angeles</time_zone_name>
        
        
        <track name="TALK" slug="1-talk"  color="#04acd6" />
        
        <track name="WORKSHOP" slug="2-workshop"  color="#b91176" />
        
        <track name="KEYNOTE" slug="3-keynote"  color="#ff5000" />
        
        <track name="HAPPY HOUR" slug="4-happy-hour"  color="#7600ff" />
        
        <track name="OPENING CEREMONY" slug="5-opening-ceremony"  color="#d2d931" />
        
        <track name="CLOSING CEREMONY" slug="6-closing-ceremony"  color="#27e751" />
        
    </conference>
    <day index='1' date='2025-04-28' start='2025-04-28T04:00:00-07:00' end='2025-04-29T03:59:00-07:00'>
        <room name='MAIN TRACK' guid='c7bc739b-5ded-5839-bbca-fa1b5799b305'>
            <event guid='ce307a30-c13a-5740-92a0-c4c4c9e9d37c' id='35'>
                <room>MAIN TRACK</room>
                <title>WELCOME CEREMONY</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T09:15:00-07:00</date>
                <start>09:15</start>
                <duration>00:15</duration>
                <abstract>WELCOME CEREMONY</abstract>
                <slug>hackthebay-2025-35-welcome-ceremony</slug>
                <track>OPENING CEREMONY</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>WELCOME CEREMONY</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BCDYXL/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BCDYXL/feedback/</feedback_url>
            </event>
            <event guid='2969806a-21af-5fd3-971f-41ab207a8180' id='36'>
                <room>MAIN TRACK</room>
                <title>KEYNOTE</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-28T09:30:00-07:00</date>
                <start>09:30</start>
                <duration>00:30</duration>
                <abstract>OPENING KEYNOTE</abstract>
                <slug>hackthebay-2025-36-keynote</slug>
                <track>KEYNOTE</track>
                
                <persons>
                    <person id='44'>Malcolm Harkins</person><person id='45'>Eoin Wickens</person>
                </persons>
                <language>en</language>
                <description>OPENING KEYNOTE</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/ZADCW7/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/ZADCW7/feedback/</feedback_url>
            </event>
            <event guid='965c5bfc-1c3d-5908-8cec-2a295a3dcfec' id='10'>
                <room>MAIN TRACK</room>
                <title>From pocket to Pwn: How we hacked a multinational corporation for $200 with just what&#8217;s in our pockets (and theirs)</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T10:00:00-07:00</date>
                <start>10:00</start>
                <duration>00:45</duration>
                <abstract>Not all Red Team engagements are spearphish &gt; mimikatz &gt; profit. If nothing else, this talk proves that some jobs still involve crawling around car parks at night and hiding in bushes with a high gain antenna to gain your objective.

Traditionally, cyber incidents and Red Team operations focus on compromising Windows devices as an initial infection vector but for modern cloud native companies, this approach simply doesn&#8217;t work.

In this talk, we will explore how we compromised an Electric Vehicle to infiltrate a corporate Smartphone, leveraging legitimate applications and protocols to move laterally and achieve full compromise of the environment.

We will demonstrate the chaining of low code (and in some cases ancient techniques), abstract attack vectors targeting atypical devices and platforms and the abuse of protocols and inbuilt applications to conduct a full scale breach of the environment.</abstract>
                <slug>hackthebay-2025-10-from-pocket-to-pwn-how-we-hacked-a-multinational-corporation-for-200-with-just-what-s-in-our-pockets-and-theirs-</slug>
                <track>TALK</track>
                <logo>/media/hackthebay-2025/submissions/XEVY8W/pocketpwn_ZwEZEm8.jpg</logo>
                <persons>
                    <person id='13'>Tim Shipp</person><person id='35'>Lisa Landau</person>
                </persons>
                <language>en</language>
                <description>When Red Teaming a multinational technology company with an extensive security budget we had to think outside the box in order to leverage new attack pathways to gain a foothold in their environment where typical Red Teaming methodologies simply weren&#8217;t viable.

Using readily available hardware and almost no code, we were able to abuse both application protocols and inbuilt applications to gain persistent access via a chained attack across multiple devices to gain system level access to a customer environment.

This talk will focus on a modified real world scenario which included:

Denial of BlueTooth service (conceptual due to legal implications)
Wireless BadUSB
Modified Metasploit for Android
Abuse of Android Debugging Tool (ADB) to gain persistent reverse shell over Mobile Service (not USB)
Abuse of ADB for real time screen recording and interaction
Network enumeration via ADB
Using ADB as a pivot for further compromise of the environment
Exfiltration of VPN configuration and subsequent abuse of MFA
Undetectable data exfiltration via mobile service

This talk highlights how devastating attacks are still easily possible with a very low price entry point and virtually undetectable by most Security Tools. This talk will feature a live demo (if the demo gods deem it so) and aim to encourage aspiring penetration testers to think outside of the (Windows) box when approaching their objectives.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/XEVY8W/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/XEVY8W/feedback/</feedback_url>
            </event>
            <event guid='77c520d0-d293-53d6-bc49-edea0bbf9df1' id='28'>
                <room>MAIN TRACK</room>
                <title>Adversarial Intelligence: Redefining Application Security through the eyes of an attacker</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T10:45:00-07:00</date>
                <start>10:45</start>
                <duration>00:45</duration>
                <abstract>Unveil how attackers exploit overlooked vulnerabilities with one of the creators of Pegasus. This talk dives into real-world attack chains, runtime analysis, and adversarial intelligence, arming you with advanced techniques to expose and mitigate threats in cloud-native and distributed systems.

This presentation explores Adversarial Intelligence - an approach that views application security from an attacker&#8217;s perspective. Drawing from vulnerability research experience at the NSO Group and building Pegasus, the speaker will highlight how overlooked low and medium vulnerabilities can be combined to execute successful attacks. By examining attack chains and application runtime behavior, attendees will see how gaps often missed by traditional methods are exposed. Attendees will learn about effective tools and techniques for detecting and mitigating these threats, especially in cloud-native and distributed systems. Designed for security practitioners and academics, this session provides a deeper understanding of defending against sophisticated attackers by adopting their mindset.</abstract>
                <slug>hackthebay-2025-28-adversarial-intelligence-redefining-application-security-through-the-eyes-of-an-attacker</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='51'>Aviv Mussinger</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VHU3FS/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VHU3FS/feedback/</feedback_url>
            </event>
            <event guid='b757912d-f9ef-5901-b4e4-c77d9dd45a02' id='18'>
                <room>MAIN TRACK</room>
                <title>Netsec is dead(?): Modern Network Fingerprinting for Real-World Defense</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T11:30:00-07:00</date>
                <start>11:30</start>
                <duration>00:45</duration>
                <abstract>As scanning and reconnaissance grows more diverse - from public platforms like Shodan and Censys to hidden probing by botnets and bulletproof hosting services&#8212;security teams need better ways to understand who is on the other side of their network connections. This talk will show how network fingerprinting has developed over time, starting with tools like p0f and moving up to more advanced methods like JA4, JA4+, and MuonFP. We&#8217;ll discuss how these modern fingerprints can help analysts recognize the tools and infrastructure used by attackers&#8212;whether they are fast scanners, basic banner grabbers, or connections routed through VPNs and jump servers. You&#8217;ll learn how to use these fingerprints to strengthen your defenses, protect critical infrastructure, and reduce your visibility to public scanners. We will also explain how to fit fingerprinting into security team workflows, noting both what it can and cannot do. Attendees will leave with a practical understanding of modern fingerprinting techniques and a few examples they can apply in their daily work.</abstract>
                <slug>hackthebay-2025-18-netsec-is-dead-modern-network-fingerprinting-for-real-world-defense</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='20'>Vlad Iliushin</person>
                </persons>
                <language>en</language>
                <description>Network reconnaissance is often overshadowed by other threats, like phishing, yet it remains a critical first step in the kill chain. Because edge infrastructure is typically exposed around the clock, adversaries have a 24/7 opportunity to gather information and use it for initial exploitation. 
In this talk, we&#8217;ll trace the evolution of network fingerprinting, starting with traditional methods like p0f, which relied on passive TCP/IP signature analysis, and advancing to modern suits (JA4, JA4+, MuonFP). By walking through each generation of fingerprinting, I&#8217;ll show how visibility has expanded along with the trade-offs and limitations inherent in these methods.

I&#8217;ll present real-world scenarios that highlight how to spot fast scanners indexing massive numbers of hosts, how to detect covert traffic routed via jump boxes and VPNs, and how to block lower-level banner-grabbers. We&#8217;ll also discuss how these fingerprints can be integrated into SOC workflows, from building prioritized alerts to automating responses in firewalls and IDS.

Finally, we&#8217;ll wrap up with a practical checklist of tools, including Arkime and eBPF-based detection, as well as firewall rule approaches to immediately strengthen defenses. Attendees will leave with the knowledge and resources to apply modern fingerprinting for continuous monitoring, streamlined threat hunting, and reduced exposure to both mass and targeted network scans.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RJBHD8/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RJBHD8/feedback/</feedback_url>
            </event>
            <event guid='020b1c07-498a-5773-a0bc-b5b667ae13c5' id='27'>
                <room>MAIN TRACK</room>
                <title>Beyond Detection: Building a Living Security Knowledge Ecosystem with SNARF</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T12:15:00-07:00</date>
                <start>12:15</start>
                <duration>00:45</duration>
                <abstract>In today&apos;s rapidly evolving threat landscape, organizations struggle not with a lack of security tools, but with effectively managing the complex web of knowledge required for robust security operations. This talk introduces SNARF (Security Knowledge Automation and Response Framework), an innovative approach to organizing, connecting, and maintaining security knowledge across the entire security lifecycle. We&apos;ll explore why traditional documentation methods fail security teams, how disconnected knowledge silos create dangerous blind spots, and why security is never a &quot;set it and forget it&quot; proposition. Learn how integrating threats, detections, testing procedures, response protocols, and automation into a unified, version-controlled ecosystem dramatically improves security posture while reducing analyst burnout. Discover practical strategies for implementing a living security knowledge repository that evolves with your organization and the threat landscape, turning your security documentation from a liability into a strategic asset.</abstract>
                <slug>hackthebay-2025-27-beyond-detection-building-a-living-security-knowledge-ecosystem-with-snarf</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='28'>John Owen</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/3ZM9CY/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/3ZM9CY/feedback/</feedback_url>
            </event>
            <event guid='8535f0f1-a4c7-5986-990d-f33f027fcd30' id='37'>
                <room>MAIN TRACK</room>
                <title>KEYNOTE</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-28T13:00:00-07:00</date>
                <start>13:00</start>
                <duration>00:30</duration>
                <abstract>KEYNOTE</abstract>
                <slug>hackthebay-2025-37-keynote</slug>
                <track>KEYNOTE</track>
                
                <persons>
                    <person id='43'>Jake Williams (aka MalwareJake)</person>
                </persons>
                <language>en</language>
                <description>KEYNOTE</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QNZ3XY/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QNZ3XY/feedback/</feedback_url>
            </event>
            <event guid='9cca347a-7dce-5874-a6c4-aac194bc9c86' id='34'>
                <room>MAIN TRACK</room>
                <title>Breaking Down Silos: Unify Assets, Minimize Attack Exposure</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T13:30:00-07:00</date>
                <start>13:30</start>
                <duration>00:30</duration>
                <abstract>Security is tasked with understanding all threat vectors and uses a wide range of tooling to do so (endpoint, identities, and networks). But different tools performing different functions create silos and in between those disjointed siloes lie risks. Risks that can be mitigated by a single view across all assets across all systems. This session seeks to explore a unification of assets to minimize attack exposure.</abstract>
                <slug>hackthebay-2025-34-breaking-down-silos-unify-assets-minimize-attack-exposure</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='34'>Lucas Zaichkowsky</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/HVWUVF/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/HVWUVF/feedback/</feedback_url>
            </event>
            <event guid='f72b781f-8d80-544a-bee3-b8c4a6ee7ef2' id='30'>
                <room>MAIN TRACK</room>
                <title>SAST AI</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T14:00:00-07:00</date>
                <start>14:00</start>
                <duration>00:45</duration>
                <abstract>Secure static code analysis with AI and patterns.</abstract>
                <slug>hackthebay-2025-30-sast-ai</slug>
                <track>TALK</track>
                <logo>/media/hackthebay-2025/submissions/SC9GX8/Screenshot_2025-03-31_at_4.51.26PM.jpeg_p2BW4oo.png</logo>
                <persons>
                    <person id='31'>Bogdan Barchuk</person>
                </persons>
                <language>en</language>
                <description>Will discuss deeply what is SAST is.
(Static Application Security Testing) and how using AI and pattern matching find source code vulnerabilities.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SC9GX8/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SC9GX8/feedback/</feedback_url>
            </event>
            <event guid='1aa22209-2fe7-52f9-8174-1a43e70a11b0' id='22'>
                <room>MAIN TRACK</room>
                <title>Exploitation Techniques in APIs: RESTful, SOAP ,GraphQL and gRPC,</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T14:45:00-07:00</date>
                <start>14:45</start>
                <duration>00:45</duration>
                <abstract>This talk will cover key exploitation techniques for RESTful, SOAP, GraphQL, and gRPC APIs, based on the OWASP API Security Top 10. It will include practical demonstrations of vulnerabilities like injection flaws, broken authentication, and data exposure using tools like Burp Suite and custom scripts. The session will also highlight the Open-Sec framework for structured API penetration testing.</abstract>
                <slug>hackthebay-2025-22-exploitation-techniques-in-apis-restful-soap-graphql-and-grpc-</slug>
                <track>TALK</track>
                <logo>/media/hackthebay-2025/submissions/LYFTBR/APi-hck_s2TFvY9.png</logo>
                <persons>
                    <person id='25'>Toshiro Nagata Bolivar</person>
                </persons>
                <language>en</language>
                <description>This talk will explore key attack and exploitation techniques for RESTful, SOAP, GraphQL, and gRPC APIs, based on the OWASP API Security Top 10 framework. We&apos;ll cover practical methods to identify and exploit vulnerabilities such as injection flaws, broken authentication, and data exposure. The focus will be on real-world attack scenarios using tools like Burp Suite and custom scripts.

We&apos;ll dive into specific vulnerabilities for each API type: manipulating RESTful tokens, exploiting GraphQL query injection, compromising gRPC protobuf-based requests, and executing XML external entity (XXE) attacks on SOAP. The session will provide step-by-step demonstrations of these techniques, highlighting how to chain them for maximum impact.

Finally, we&apos;ll discuss the Open-Sec framework and how to apply it to API penetration testing. This structured approach&#8212;covering reconnaissance, scanning, testing, and analysis&#8212;will help identify and exploit complex vulnerabilities, offering actionable insights to improve API security.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LYFTBR/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LYFTBR/feedback/</feedback_url>
            </event>
            <event guid='49a87378-16c0-51c0-9b98-74ee25b6a202' id='45'>
                <room>MAIN TRACK</room>
                <title>Rules Writers and Threat Hunters in the Age of AI</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T15:30:00-07:00</date>
                <start>15:30</start>
                <duration>00:30</duration>
                <abstract>This presentation introduces LogLMs, transformer-based foundation models specifically pre-trained on log sequences. LogLMs understand the &apos;language&apos; of logs, enabling it to identify anomalies and deviations from normal behavior across diverse protocols and usage patterns. Unlike rules-based systems, LogLMs adapt to changing environments through active learning and federated fine-tuning. This approach provides holistic security, including anomaly detection, threat hunting, real-time alerts, compliance, and forensics. We will see how a LogLM, deployed as TEMPO, detects novel attacks, and empowers forensic analysis.</abstract>
                <slug>hackthebay-2025-45-rules-writers-and-threat-hunters-in-the-age-of-ai</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='42'>Eric Zietlow</person>
                </persons>
                <language>en</language>
                <description>To Be Determined</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/9NBABQ/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/9NBABQ/feedback/</feedback_url>
            </event>
            <event guid='6af21f5f-d062-51c7-85b3-1c0c424cb0b8' id='12'>
                <room>MAIN TRACK</room>
                <title>Beyond SAST: Advancing Vulnerability Detection with Symbolic Execution</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T16:00:00-07:00</date>
                <start>16:00</start>
                <duration>00:45</duration>
                <abstract>Static analysis is crucial but limited in detecting vulnerabilities tied to dynamic data and runtime behavior. This session introduces symbolic execution to extend SAST&#8217;s capabilities, showcasing how symbolic execution improves vulnerability detection through symbolic execution, illustrated with real-world examples and demonstrations.</abstract>
                <slug>hackthebay-2025-12-beyond-sast-advancing-vulnerability-detection-with-symbolic-execution</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='55'>Ulrich Lang</person><person id='16'>Jason Kramer</person>
                </persons>
                <language>en</language>
                <description>Static Application Security Testing (SAST) is a vital tool for securing software, but its limitations, such as difficulty handling complex inputs, runtime behaviors, and dynamic data, can lead to missed vulnerabilities and false positives. This session explores these challenges and introduces symbolic execution, enhanced with artificial intelligence, as a game-changing solution. Symbolic execution goes beyond traditional static analysis by simulating all possible execution paths of a program, abstracting inputs symbolically to uncover hidden vulnerabilities like race conditions, memory safety violations, and edge case errors. We&#8217;ll also discuss the limitations of symbolic execution, such as path explosion, and strategies to mitigate them.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/J9FZJB/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/J9FZJB/feedback/</feedback_url>
            </event>
            <event guid='72a20a73-f48a-55f9-98ed-a5333ce2c73e' id='33'>
                <room>MAIN TRACK</room>
                <title>GameHacking 101</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T16:45:00-07:00</date>
                <start>16:45</start>
                <duration>00:30</duration>
                <abstract>Security within games is a popular yet somehow underserved topic. Video games offer various challenges for curious engineers to explore, including reverse engineering, anti-cheat systems, modding, DRM, etc. This talk aims to make these topics and discussions accessible to all levels of technical experience, both within and outside the gaming industry. We&apos;ll also examine the game we specifically created for the GameHacking.GG CTF was held at DEFCON32 last year. You can download and play the game we will be discussing from the website before attending this talk at: gamehacking.gg. Julian is leading the Game Hacking Village at DEFCON 33 this year and is looking for interested volunteers!</abstract>
                <slug>hackthebay-2025-33-gamehacking-101</slug>
                <track>TALK</track>
                <logo>/media/hackthebay-2025/submissions/VVD73L/Screenshot_2025-04-01_173941_jiLYKsu.png</logo>
                <persons>
                    <person id='33'>Julian Dunning</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VVD73L/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/VVD73L/feedback/</feedback_url>
            </event>
            <event guid='dc9300d7-f273-55db-8cc0-cf8d9c134834' id='42'>
                <room>MAIN TRACK</room>
                <title>KEYNOTE</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2025-04-28T17:15:00-07:00</date>
                <start>17:15</start>
                <duration>00:30</duration>
                <abstract>CLOSING KEYNOTE</abstract>
                <slug>hackthebay-2025-42-keynote</slug>
                <track>KEYNOTE</track>
                
                <persons>
                    <person id='46'>Sunil Gottumukkala</person>
                </persons>
                <language>en</language>
                <description>CLOSING KEYNOTE</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QLZMKV/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/QLZMKV/feedback/</feedback_url>
            </event>
            <event guid='2d443d94-df9d-5abc-ad71-53be39834246' id='38'>
                <room>MAIN TRACK</room>
                <title>CLOSING CEREMONY</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T17:45:00-07:00</date>
                <start>17:45</start>
                <duration>00:20</duration>
                <abstract>CLOSING CEREMONY</abstract>
                <slug>hackthebay-2025-38-closing-ceremony</slug>
                <track>CLOSING CEREMONY</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>CLOSING CEREMONY</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/M78KTL/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/M78KTL/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='TRACK 2' guid='b6e3d7d0-87ca-5cd8-b21a-734946a2ddc9'>
            <event guid='5f22212a-691f-5d44-a378-82bde0b40051' id='19'>
                <room>TRACK 2</room>
                <title>Attacking AI</title>
                <subtitle></subtitle>
                <type>Workshop</type>
                <date>2025-04-28T10:00:00-07:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>Attacking AI is a one of a kind session releasing case studies, tactics, and methodology from Arcanum&#8217;s AI assessments in 2024 and 2025.</abstract>
                <slug>hackthebay-2025-19-attacking-ai</slug>
                <track>WORKSHOP</track>
                <logo>/media/hackthebay-2025/submissions/SH8SWT/Talk_Attacking_AI_1_WMefnA6.png</logo>
                <persons>
                    <person id='21'>Jason Haddix</person>
                </persons>
                <language>en</language>
                <description>While most AI assessment material focuses on academic AI red team content, &#8220;Attacking AI&#8221; is focused on the task of assessing AI enabled systems. 

Join Jason as he discusses his seven point methodology to assessing these systems and releases Arcanum&#8217;s prompt injection taxonomy and other resources for aspiring testers.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SH8SWT/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/SH8SWT/feedback/</feedback_url>
            </event>
            <event guid='b03f5d0f-e276-593f-ba3e-4b2116f79ffe' id='2'>
                <room>TRACK 2</room>
                <title>Vulnerability Exploitation in the Cloud: A Cross-Platform Graph-Based Attack</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2025-04-28T12:00:00-07:00</date>
                <start>12:00</start>
                <duration>00:45</duration>
                <abstract>Practical demonstration of how the attackers can use misconfigurations across major cloud platforms, including AWS, Azure, GCP and OCI. Attendees will gain invaluable insights into the multifaceted challenges posed by misconfigurations within these cloud environments. Leveraging the power of graph-mode visualization, we will dissect and map potential attack paths arising from misconfigurations, providing a visual narrative of the complex relationships at play using open-source tools through the neo4j/memgraph database to explain some possible attacks. 
The heart of the discussion will revolve around practical mitigation approaches tailored to each cloud platform, ensuring a holistic defense strategy using open-source tools and free tools to help organizations increase their security posture. Real-world examples and case studies will illustrate the impact of misconfigurations and how a proactive approach, guided by graph-mode visualization, can significantly enhance security. 
By the end of the presentation, participants will be well-equipped to navigate the nuanced landscape of misconfigurations in AWS, Azure, GCP and OCI. This knowledge will empower cloud security professionals to implement effective mitigation strategies, fortifying their cloud environments against evolving cyber threats across diverse platforms. Attendees will gain invaluable insights into the multifaceted challenges posed by misconfigurations within these cloud environments. Leveraging the power of graph-mode visualization, we will dissect and map potential attack paths arising from misconfigurations, providing a visual narrative of the complex relationships at play.</abstract>
                <slug>hackthebay-2025-2-vulnerability-exploitation-in-the-cloud-a-cross-platform-graph-based-attack</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='7'>Filipi Pires</person>
                </persons>
                <language>en</language>
                <description>During this talk I intended to cover this:

- Welcome - 
- What is HVT - 
- Difference between Attack Vector and Attack Path -
- What is Chock Point 
- AWS IAM - 
- AWS Attacks ( Explanation and Demo) -
   - Attack Methods
   - CreatePolicyVersion
   - Attaching Attack
- Conclusions</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/WAUNKX/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/WAUNKX/feedback/</feedback_url>
            </event>
            <event guid='530c4db6-ebff-5424-b67d-19a908aad127' id='43'>
                <room>TRACK 2</room>
                <title>Layered Security for Kubernetes</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T12:45:00-07:00</date>
                <start>12:45</start>
                <duration>00:30</duration>
                <abstract>In this session, we will explore the different layers of security that can be applied or verified to enhance your security posture toward Kubernetes and containers. We will cover everything from the supply chain to production.</abstract>
                <slug>hackthebay-2025-43-layered-security-for-kubernetes</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='47'>Brian Six</person>
                </persons>
                <language>en</language>
                <description>Security for Kubernetes</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BGTZW8/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/BGTZW8/feedback/</feedback_url>
            </event>
            <event guid='d1681793-bf0b-52db-b5e2-b4a14b19f96e' id='44'>
                <room>TRACK 2</room>
                <title>Tabletop War Gaming</title>
                <subtitle></subtitle>
                <type>Workshop</type>
                <date>2025-04-28T13:15:00-07:00</date>
                <start>13:15</start>
                <duration>02:00</duration>
                <abstract>Come bring both your blue team and red team hats to interactively participate in attack scenarios.  Vote with your colleagues on the best approach the security team should take when presented with a potential security incident, and what the threat actor should do when encountering response activity. Join your peers as you test your incident response and attack strategies in a gamified lively discourse.</abstract>
                <slug>hackthebay-2025-44-tabletop-war-gaming</slug>
                <track>WORKSHOP</track>
                
                <persons>
                    <person id='48'>Mike Lombardi</person><person id='49'>Erik Barzdukas</person>
                </persons>
                <language>en</language>
                <description>Tabletop War Gaming brought to you by Google - Mandiant</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RXUVVC/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/RXUVVC/feedback/</feedback_url>
            </event>
            <event guid='7db1399b-67ad-528d-8142-e91473fa5bd2' id='4'>
                <room>TRACK 2</room>
                <title>Devops and threat research walk into a bar...</title>
                <subtitle></subtitle>
                <type>Lightning Talk</type>
                <date>2025-04-28T15:15:00-07:00</date>
                <start>15:15</start>
                <duration>00:30</duration>
                <abstract>In the fast-paced world of cybersecurity, bringing context to new vulnerabilities quickly is more important than ever. As a Threat Researcher at Datadog, I&apos;ve been involved in developing an approach to deploying honeypots using CI/CD pipelines. This method allows us to rapidly set up honeypots in real-world environments, tailored specifically to the technologies our customers use.</abstract>
                <slug>hackthebay-2025-4-devops-and-threat-research-walk-into-a-bar-</slug>
                <track>TALK</track>
                
                <persons>
                    <person id='8'>Andy Giron</person><person id='56'>Arthi Nagarajan</person>
                </persons>
                <language>en</language>
                <description>In my presentation, I&apos;ll discuss how we&apos;ve integrated CI/CD pipelines to automate the deployment of both low and high-interaction honeypots. By tailoring these honeypots to mirror our customers&apos; technology stacks, we&apos;ve been able to gather more relevant threat data. I&apos;ll explain how we&apos;ve used HASH (https://github.com/DataDog/HASH) to quickly deploy low-interaction honeypots and delve into how container technology allows us to deploy high-interaction honeypots capable of running any technology stack. Additionally, I&apos;ll highlight how the data we collect enhances our understanding of threats and enriches our customers&apos; logs with valuable security insights. Our approach stands out because it combines DevOps methodologies with cybersecurity practices to create a dynamic and responsive honeypot deployment system. By integrating CI/CD pipelines, we&apos;re able to respond rapidly to emerging threats, deploying honeypots in real-time as new vulnerabilities surface. We customize these honeypots to reflect our customers&apos; actual environments, making the data we collect more relevant. This integration also streamlines the entire process from deployment to data analysis, reducing manual effort and minimizing potential errors. I&apos;ll share recent case studies to illustrate the effectiveness of our approach. For example, I&apos;ll talk about how we quickly deployed honeypots to capture exploit attempts on a newly discovered Confluence vulnerabilities, Docker API exploitation, Log4J, and Redis exploitation. I&apos;ll also discuss how our high-interaction honeypots allowed us to monitor attackers&apos; behavior after they gained initial access. Additionally, I&apos;ll highlight instances where the intelligence we gathered significantly improved our customers&apos; ability to detect and respond to threats. These real-world examples will demonstrate the impact of our methods.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LXBZF8/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/LXBZF8/feedback/</feedback_url>
            </event>
            <event guid='d7e0ab8f-1b87-5693-b142-e6a4f306bbcd' id='5'>
                <room>TRACK 2</room>
                <title>Securing Critical Infrastructure</title>
                <subtitle></subtitle>
                <type>Workshop</type>
                <date>2025-04-28T15:45:00-07:00</date>
                <start>15:45</start>
                <duration>02:00</duration>
                <abstract>Critical infrastructure like water treatment plants and air traffic control towers are under constant attack by hostile nations, and securing them is a national priority. This workshop covers industrial automation systems, network security monitoring, and incident response. Participants will perform many hands-on projects configuring systems, attacking them, and defending them.</abstract>
                <slug>hackthebay-2025-5-securing-critical-infrastructure</slug>
                <track>WORKSHOP</track>
                
                <persons>
                    <person id='9'>Sam Bowne</person>
                </persons>
                <language>en</language>
                <description>The workshop is structured as a CTF competition.  There will be demonstrations of the techniques, and help on the challenges will be available.

We will use Modbus and DNP networks, as well as normal IP-based networks.  Software used includes OpenPLC, FactoryIO, Splunk, Velociraptor, and Zeek.

Participants need a laptop capable of running virtual machines, or a few dollars to rent cloud servers.

All class materials are freely available on the Web and may be easily used in other classes.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/UYWEQQ/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/UYWEQQ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='SOLDERING VILLAGE' guid='2751fe3d-5191-58b4-8075-11ef48fe1c6a'>
            <event guid='9641a34a-7c5e-5db4-86c0-0e37d938911b' id='47'>
                <room>SOLDERING VILLAGE</room>
                <title>Soldering Village</title>
                <subtitle></subtitle>
                <type>Village</type>
                <date>2025-04-28T10:00:00-07:00</date>
                <start>10:00</start>
                <duration>07:00</duration>
                <abstract>Do you want to learn how to solder? Are you afraid of thinking you are going to burn yourself? Don&apos;t be scared, we&apos;ve got your back. Famous and renowned badge Maker Abhinav (Panda) Pandagale will teach you the basics of soldering. You are going to have a chance to solder a badge.</abstract>
                <slug>hackthebay-2025-47-soldering-village</slug>
                <track>WORKSHOP</track>
                
                <persons>
                    <person id='53'>Abhinav Pandagale</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.pacifichackers.com/hackthebay-2025/talk/JZAJRB/</url>
                <feedback_url>https://cfp.pacifichackers.com/hackthebay-2025/talk/JZAJRB/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
