<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RZZMHT@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RZZMHT</pentabarf:event-slug>
            <pentabarf:title>OPENING CEREMONY</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T104500</dtstart>
            <dtend>20260323T110000</dtend>
            <duration>0.01500</duration>
            <summary>OPENING CEREMONY</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/RZZMHT/</url>
            <location>WORKSHOPS</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>PTHYVR@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-PTHYVR</pentabarf:event-slug>
            <pentabarf:title>NO BADGE REQUIRED: An Unconventional Journey Through Cybersecurity&#x27;s Front Lines</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T110000</dtstart>
            <dtend>20260323T113000</dtend>
            <duration>0.03000</duration>
            <summary>NO BADGE REQUIRED: An Unconventional Journey Through Cybersecurity&#x27;s Front Lines</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/PTHYVR/</url>
            <location>WORKSHOPS</location>
            
            <attendee>Ryan Massfeller @Ryan4n6</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HPJMLP@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HPJMLP</pentabarf:event-slug>
            <pentabarf:title>Catch &amp; Release Phramework: Credential Harvesting Without the Phishing Page</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T113000</dtstart>
            <dtend>20260323T124000</dtend>
            <duration>1.01000</duration>
            <summary>Catch &amp; Release Phramework: Credential Harvesting Without the Phishing Page</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/HPJMLP/</url>
            <location>WORKSHOPS</location>
            
            <attendee>David Porcello</attendee>
            
            <attendee>Rob Wright</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LBXQ3P@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LBXQ3P</pentabarf:event-slug>
            <pentabarf:title>Red teaming with LoRa and Meshtastic</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T130000</dtstart>
            <dtend>20260323T143000</dtend>
            <duration>1.03000</duration>
            <summary>Red teaming with LoRa and Meshtastic</summary>
            <description>This workshop introduces LoRa, a low-power, long-range wireless technology gaining traction in commercial and community networks. We will then explore a popular community networking application called Meshtastic. Using our devices, we will join the local community network and become familiar with how to locate other nodes and communicate with them. We will then learn how to create a closed community in which only we can participate.

Will then download the Meshtastic firmware build system on our laptops and learn how to build custom firmware.

Finally, we will explore how this technology can be used for red-teaming, considering that the bad guys are already looking for ways to exploit this new and fantastic technology. As part of this exercise, you will hack a remote system miles away using your LoRa node!

For the best experience, participants should bring their laptops and also have access to a LoRa device. If you would like to purchase a LoRa kit, we will have kits for sale for $35.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/LBXQ3P/</url>
            <location>WORKSHOPS</location>
            
            <attendee>Venky Raju</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HAWGXZ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HAWGXZ</pentabarf:event-slug>
            <pentabarf:title>Malware analysis: Learn Windows internals and how malware operates</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T143000</dtstart>
            <dtend>20260323T160000</dtend>
            <duration>1.03000</duration>
            <summary>Malware analysis: Learn Windows internals and how malware operates</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/HAWGXZ/</url>
            <location>WORKSHOPS</location>
            
            <attendee>Sam Bowne</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QRWHYC@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QRWHYC</pentabarf:event-slug>
            <pentabarf:title>Let’s hack from the beginning</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T160000</dtstart>
            <dtend>20260323T171500</dtend>
            <duration>1.01500</duration>
            <summary>Let’s hack from the beginning</summary>
            <description>This will be a presentation followed by a workshop on methods and tactics i’ve learned along my hacking adventures. I will pick a exploit
or method that worked for me in each field and will drill down on how to look at it from the beginning with only beginner knowledge,  I will share my way of  thinking and how not to be afraid of going down weird rabbit holes</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/QRWHYC/</url>
            <location>WORKSHOPS</location>
            
            <attendee>Rotem Bar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NDP7DU@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NDP7DU</pentabarf:event-slug>
            <pentabarf:title>CLOSING CEREMONY</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T171500</dtstart>
            <dtend>20260323T173000</dtend>
            <duration>0.01500</duration>
            <summary>CLOSING CEREMONY</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lightning Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/NDP7DU/</url>
            <location>WORKSHOPS</location>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3NCYCE@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3NCYCE</pentabarf:event-slug>
            <pentabarf:title>Identity Hunting with Malicious Documents</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T113000</dtstart>
            <dtend>20260323T124500</dtend>
            <duration>1.01500</duration>
            <summary>Identity Hunting with Malicious Documents</summary>
            <description>Outline

1 - Introduction &amp; Context
    - Why identity is the real target behind document-based attacks.
    - The role of malicious documents in modern infostealer campaigns.

2 - Malicious Documents as Identity Attack Vectors
    - PDFs, Word, and Excel as weaponized platforms.
    - Common identity theft objectives in document-based attacks.
    - From initial access to credential harvesting.

3 - Understanding Malicious Document Structures
    - High-level overview of PDF, Word, and Excel internals.
    - Execution flow: scripts, macros, embedded objects, and actions.
    - Where and how identity-harvesting logic is hidden.

4 - Dissecting a Malicious Document (Live Demo)
    - Step-by-step analysis of a weaponized document.
    - Practical use of tools such as:
    - pdfid, pdf-parser, pdftk and others

5 - Encoding, Obfuscation, and Evasion Techniques ( Demo )
    - Common encoding and obfuscation methods used in documents.
    - Layered techniques to bypass detection engines.
    - How attackers protect identity-stealing workflows.

6 - OSINT: From Document to Identity Infrastructure ( Demo)
    - Extracting indicators from malicious documents.
    - Pivoting to OSINT sources for enrichment.
    - Identifying Command &amp; Control endpoints and identity abuse infrastructure.
    - Correlating domains, emails, reused artifacts, and leaked data.

7 - Building an Identity-Focused Investigation
    -Mapping document artifacts to attacker behavior.
    - Campaign tracking and attribution signals.
    - Using document intelligence to support IR, SOC, and Threat Intel teams.

8 - Conclusion &amp; Key Takeaways
    - Turning malicious documents into intelligence assets.
    - Investigating identity abuse beyond the payload.
    - Final insights and open discussion.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/3NCYCE/</url>
            <location>TALKS</location>
            
            <attendee>Filipi Pires</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZHCF3M@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZHCF3M</pentabarf:event-slug>
            <pentabarf:title>Reverse Engineering Embedded AI Models in Firmware and Binaries</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T131500</dtstart>
            <dtend>20260323T140000</dtend>
            <duration>0.04500</duration>
            <summary>Reverse Engineering Embedded AI Models in Firmware and Binaries</summary>
            <description>This presentation takes a technical, hands-on look at how reverse engineers encounter AI models once they are deployed inside firmware images and compiled binaries. Rather than treating AI as a black box, the session walks through concrete analysis workflows that expose how models are packaged, optimized, and executed at the binary level.

The talk covers multiple deployment patterns, including serialized model formats and fully compiled inference pipelines produced by modern AI toolchains. Attendees will see how common reverse engineering tools can be used to locate model artifacts, distinguish inference logic from surrounding code, and reason about model structure and behavior even when traditional metadata is absent.

Practical demonstrations illustrate how recovered information can be used to reconstruct portions of a model, validate assumptions about its architecture, and assess downstream risks such as unauthorized reuse, tampering, and adversarial manipulation. The session concludes by discussing defensive implications and what these findings mean for teams responsible for deploying or securing AI-enabled systems.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/ZHCF3M/</url>
            <location>TALKS</location>
            
            <attendee>Stephen Brennan</attendee>
            
            <attendee>Ulrich Lang</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>KNEYAQ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-KNEYAQ</pentabarf:event-slug>
            <pentabarf:title>What Happens After You Report an AI Bug: From Model Behavior to Real Impact</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T140000</dtstart>
            <dtend>20260323T144500</dtend>
            <duration>0.04500</duration>
            <summary>What Happens After You Report an AI Bug: From Model Behavior to Real Impact</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/KNEYAQ/</url>
            <location>TALKS</location>
            
            <attendee>Ani Turner</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>XNRRSQ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-XNRRSQ</pentabarf:event-slug>
            <pentabarf:title>Bluetooth Warwalking: Hacking the Airwaves with Your Phone and a Pair of Sneakers</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T144500</dtstart>
            <dtend>20260323T153000</dtend>
            <duration>0.04500</duration>
            <summary>Bluetooth Warwalking: Hacking the Airwaves with Your Phone and a Pair of Sneakers</summary>
            <description>TALK STRUCTURE &amp; TIMELINE (45 MINUTES)
___
This presentation delivers comprehensive coverage of Bluetooth exploitation, moving from accessible demonstrations through systematic data collection to large-scale privacy implications with detailed technical methodology.

PART 1: PRACTICAL EXPLOITATION (12-15 MINUTES)
___
I&#x27;ll demonstrate real-world Bluetooth hijacking using only commodity hardware with expanded audience interaction:

• Receipt Printer Takeover: I&#x27;ll bring an Epson TM-M30II thermal printer and demonstrate the complete connection process step-by-step. I&#x27;ll share the story of how I discovered and exploited an unsecured café printer using only the free iOS Epson TM Utility app to print messages claiming to be from &quot;time travelers from 2036,&quot; which convinced local high school employees they&#x27;d made contact with the future. The printer will be live in the room with time for 2-3 audience members to attempt connections during the presentation. This attack requires zero technical knowledge, just opening your phone&#x27;s Bluetooth menu and downloading an app.

• Samsung TV Hijacking: I&#x27;ll walk through my two-stage attack progression in detail: (1) Audio-only takeover using smartphone Bluetooth pairing (demonstrated at a smoothie bar), showing the actual pairing interface, and (2) Full video control combining Flipper Zero IR commands (universal Samsung remote) with same-network Wi-Fi access (demonstrated at a Chicago bar). I&#x27;ll demonstrate the Flipper Zero IR commands live if the venue has a Samsung TV. The vulnerability: manufacturer default settings with no authentication. In Chicago, simply asking the bartender for WiFi password gave me complete control of all their Samsung displays.

• Extended Device Tour: Detailed demonstrations of additional vulnerable devices including ProSmart bed bases at Mattress Firm, commercial speakers, hotel door locks broadcasting room numbers in plaintext, and smart home devices, all with specific exploitation scenarios and video footage where available.

PART 2: SCALING RESEARCH WITH KISMET (15-18 MINUTES)
___
How I moved from opportunistic hacking to systematic research with technical depth:

• Hardware Deep Dive: Raspberry Pi 4 + GPS dongle + battery (~$100 total). I&#x27;ll show the actual physical rig and walk through the complete setup: auto-connects to phone hotspot, establishes Tailscale VPN for remote access, syncs Kismet logs to home server via rsync. I travel with this constantly and will explain why each component matters for scalable data collection.

• Kismet Configuration: I&#x27;ll share my actual Kismet config files, explain what data fields I&#x27;m capturing (device names, MAC addresses, manufacturer data, signal strength/RSSI, timestamps, GPS coordinates) and discuss storage requirements and data management at scale.

• Dataset Overview: ~100,000+ device observations across San Francisco, Nashville, NYC, Las Vegas.

• Extended Live Analysis Session: I&#x27;ll have the rig running during the talk, collecting data from the conference room. I&#x27;ll SSH in and execute multiple Python analysis scripts live, showing my complete data pipeline from raw Kismet logs to actionable intelligence. Expect to see real-time enumeration of Flipper Zeros, smart watches, meshtastic nodes, and whatever else attendees are carrying. I&#x27;ll demonstrate querying patterns across cities and show visualization of tracking patterns.

• Cross-City Comparisons: Detailed statistics comparing device security posture across San Francisco vs Nashville vs NYC vs Las Vegas, discussing how geographic and demographic factors influence what devices are present and how they&#x27;re configured.

PART 3: PRIVACY IMPLICATIONS &amp; TRACKING (10-12 MINUTES)
___
Data-driven privacy implications with concrete examples:

• Key Statistics: 7-8% devices broadcast human-readable names, 60-65% have persistent identifiers enabling tracking, 99% are Bluetooth Low Energy (IoT dominance), 1,300 devices detected in a 1/4-mile suburban walk.

• Tracking Demonstration: I&#x27;ll show actual examples of tracking specific devices across multiple days and locations using GPS-tagged data (anonymized), explaining how correlation attacks work in practice.
Hotel Lock Analysis: Detailed discussion of Bluetooth door locks broadcasting room numbers in plaintext and the privacy implications for hotel guests who don&#x27;t realize their room location is being broadcast to anyone nearby.

• Surveillance Infrastructure: Static MAC addresses + GPS logs = anyone with $100 and basic Python skills can track people moving through cities. I&#x27;ll discuss how retailers could use this technology, compare it to existing WiFi tracking infrastructure, and explain why Bluetooth tracking is actually more problematic due to its ubiquity and constant broadcasting.

• Statistical Deep Dive: I&#x27;ll present my data science methodology, show visualizations of device density patterns, and discuss temporal patterns (time of day, day of week variations).

• Wasteful Broadcasting: Some devices transmit absurdly: Molekule air purifiers send 50 packets/minute (38,000 in 12 hours), Pura fragrance diffusers constantly broadcasting. No legitimate reason for this frequency.

PART 4: DEFENSIVE MEASURES &amp; CALL TO ACTION (5-6 MINUTES)
___
• Manufacturers: Specific technical standards they should adopt (default-secure configs, require authentication, rotate MAC addresses), with examples of companies doing it right vs wrong.

• Enterprise Security: How businesses should audit their Bluetooth attack surface, specific tools for continuous monitoring, disable discoverability on commercial devices.

• Individual Actions: Practical steps attendees can take today to audit their own devices, discussion of iOS/Android privacy controls, understand what your devices broadcast.

• Policy Discussion: Should there be regulations around Bluetooth device security? What would effective regulation look like?

Core Problem: If I can do this without Bluetooth expertise, anyone can.

Q&amp;A (Remaining Time)

TECHNICAL DETAILS FOR REVIEWERS
___
• Tools &amp; Code: Open-source Python scripts for Kismet log analysis (available via GitHub), Kismet REST API for real-time data access, FastAPI backend for querying cross-city statistics, integration with WiGLE database (4.5 billion Bluetooth devices mapped globally).

• What Makes This Different: Most Bluetooth talks focus on protocol vulnerabilities or specific CVEs. This demonstrates: (1) How trivially low the barrier to entry is (smartphone + curiosity), (2) Surveillance implications at scale, (3) Data science applied to security research, (4) The gap between &quot;possible to secure&quot; and &quot;secured in practice.&quot;

• Interactive Elements: Receipt printer in room available for audience connection attempts (2-3 participants during talk), live Kismet session showing real-time device enumeration from conference attendees, multiple Python analysis scripts executed live against conference data, open-source tools shared for attendees to replicate research.

• Audience Takeaways: Practical exploitation techniques requiring minimal technical knowledge, understanding of systematic warwalking methodology with detailed technical implementation, open-source tools to conduct this research in their own cities, privacy implications of always-broadcasting IoT devices with concrete tracking examples, actionable defensive measures for individuals and organizations.

FORMAT NOTES
___
This 45-minute format allows comprehensive coverage of both practical exploitation and research methodology. Real-world exploitation stories create immediate engagement, extended live technical demonstrations show research depth and reproducibility, and detailed privacy implications provide the &quot;why this matters&quot; hook with concrete examples. Live demos include fallback screenshots if connectivity fails.

NEW CONTENT FOR HACKTHEBAY
___
This is active, ongoing research with continuous data collection. The HackTheBay presentation will feature:

• Latest multi-city comparative analysis including recently completed Las Vegas high-density environment data
• Most current statistics from expanded dataset (growth from initial research to 100,000+ observations)
• New exploitable device classes discovered through ongoing warwalking
• Refined privacy pattern analysis showing geographic differences in device security posture
• Updated defensive recommendations based on latest findings
• Extended technical methodology section covering data pipeline architecture and analysis techniques

Core demonstrations and methodology provide consistent framework, but specific statistics, device examples, privacy implications, and technical depth will reflect the current state of research at presentation time.

RESPONSIBLE DISCLOSURE NOTE
___
All exploitation demonstrations use devices I own or have explicit permission to access. No unauthorized access to third-party systems will be demonstrated. The research methodology and tools are shared for educational purposes to raise awareness of systemic security issues and encourage better manufacturer defaults. The goal is to demonstrate how accessible these vulnerabilities are to drive positive change in device security practices.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/XNRRSQ/</url>
            <location>TALKS</location>
            
            <attendee>kn0ck0ut (Matt)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>D9EHLH@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-D9EHLH</pentabarf:event-slug>
            <pentabarf:title>When Agents Execute: RCE Paths in LLM-Powered Coding Tools</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T153000</dtstart>
            <dtend>20260323T160000</dtend>
            <duration>0.03000</duration>
            <summary>When Agents Execute: RCE Paths in LLM-Powered Coding Tools</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/D9EHLH/</url>
            <location>TALKS</location>
            
            <attendee>Manesh Babu</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>QQRLTF@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-QQRLTF</pentabarf:event-slug>
            <pentabarf:title>Hunting Shells via Chaining Misconfigs in AWS</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T160000</dtstart>
            <dtend>20260323T164500</dtend>
            <duration>0.04500</duration>
            <summary>Hunting Shells via Chaining Misconfigs in AWS</summary>
            <description>Key Takeaways:

● Escalate IAM permissions to gain admin-level access
● Exploit SSRF in EC2 to steal credentials
● Abuse misconfigured Cognito identity pools for unauthorized access
● Understand how small missteps can trigger large-scale compromise
● Use tools like Cloud Nuke to safely clean and reset your infrastructure

Built for all skill levels, this lab gives security engineers, DevOps teams, and developers a safe space to break things, fix them, and come out with a sharper eye for spotting these risks before attackers do.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/QQRLTF/</url>
            <location>TALKS</location>
            
            <attendee>Sumanth</attendee>
            
            <attendee>Bhagavan Bollina</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FX83XQ@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FX83XQ</pentabarf:event-slug>
            <pentabarf:title>Soldering 101</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T113000</dtstart>
            <dtend>20260323T163000</dtend>
            <duration>5.00000</duration>
            <summary>Soldering 101</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Village</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/FX83XQ/</url>
            <location>SOLDERING VILLAGE</location>
            
            <attendee>Abhinav Pandagale</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FFD9GD@@cfp.pacifichackers.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FFD9GD</pentabarf:event-slug>
            <pentabarf:title>HAPPY HOUR</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20260323T140000</dtstart>
            <dtend>20260323T170000</dtend>
            <duration>3.00000</duration>
            <summary>HAPPY HOUR</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Village</category>
            <url>https://cfp.pacifichackers.com/hackthebay-2026/talk/FFD9GD/</url>
            <location>VENDOR AREA</location>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
