Viewing 0 current events matching “mobile technology” by Date.
Sort By: Date | Event Name, Location , Default |
---|---|
No events were found. |
Viewing 77 past events matching “mobile technology” by Date.
Sort By: Date | Event Name, Location , Default |
---|---|
Thursday
Nov 10, 2011
|
New Tech Society Happy Hour! – Thirsty Lion RSVP here: http://events.linkedin.com/New-Tech-Society-Happy-Hour/pub/836765 Hey Folks! The group is growing and we're excited for everyone to once again have a chance to connect in person. Join us for the New Tech Society happy hour. It's just around the corner: Please bring your friends--the more the merrier! Totally low-pressure and casual--be yourself! We can't say that we are giving away free ipads or iphones, but we are generously gifting a free drink to the first 10 people to arrive. Looking forward to seeing you! The NTS Crew |
Wednesday
May 3, 2017
|
PDX Women In Tech (PDXWIT) Quarterly Seasoned Women in Tech Meetup – Ruby Receptionists **Please RSVP on Eventbrite HERE**
Are you a woman with 25 or more years of experience working in technology? Do you want to build relationships with other women in tech who are still in there swinging? PDXWIT wants to foster a community for women like you. Join us at the Ruby Receptionists office in Portland. The agenda is to help us further ground this new group in our third hosted meeting, organized by Jean Richardson. PDXWIT is a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering educational programs, partnerships, mentorships, resources, and opportunities. We are unifying a supportive environment for current and potential women in tech, all of whom are committed to helping each other. Our goal is to bring together and empower women in tech and to encourage others to pursue tech careers. This is our step towards reducing the gender imbalance in the industry and addressing the current negative effects of that imbalance on women. Trans and non-binary people are always welcome at our events. |
Portland SaaS Founders - Customer Acquisition Strategies for SaaS – US Custom House / WeWork Acquiring customers for our SaaS companies is arguably one of the most difficult challenges we face. We need to figure it out what works and what doesn't work, and we need to do it before the money runs out.
• The marketing strategies that are working for us, and the ones that didn't.
• Paid vs organic marketing channels: which ones are best for every stage of growth. • How we've identified our most profitable market segments and how we're providing value to them.
|
|
Thursday
May 18, 2017
|
PDX Women in Tech (PDXWIT) Happy Hour Networking Event – Urban Studio ** Please RSVP on Eventbrite HERE **
Join us for happy hour at Urban Studio, sponsored by Lyft and in partnership with Tech Ladies! As a woman-focused community, we’ve decided it is no longer enough for our support of other underrepresented groups to be implied. This month, we’ve decided it is time to focus on the interconnectedness of the various social categorizations and dedicate the theme of this event to “Intersectionality,” with a conversation starter of “What’s a recent book, writer or film that has changed your perspective?” While the event is primarily intended for networking, we will have a short segment at 5:30 to share important announcements and showcase two women from Lyft! Introduction to Lyft, including what they do and what job opportunities are available! Lita Cho, Senior Software Engineer at Lyft, will talk to us about how intersectionality has been woven into the company’s diversity and inclusion efforts. Janani Sundarrajan, Software Engineer at Lyft, will talk about Lyft’s progressive Gender Inclusion and Affirmation policy which was recently released. During the event, we’ll have an Activity Table where people can get creative. This is a fantastic way to meet others if large groups are not your thing. If you have trouble finding it, look forMeg Aul, our Event Activities Director. PDXWIT is a community-based non-profit organization. Our purpose is to strengthen the Portland women in tech community by offering educational programs, partnerships, mentorships, resources and opportunities. We are unifying a supportive environment for current and potential women in tech, all of whom are committed to helping each other. Our goal is to bring together and empower women in tech and to encourage others to pursue tech careers. This is our step towards reducing the gender imbalance in the industry and addressing the current negative effects of that imbalance on women.
|
Saturday
Jun 10, 2017
|
Portland iOS (iPhone) App Development Group - Learn iOS Development Basics for free – This event will consist of two hours of lecture on iOS development basics, followed by an hour of discussion and networking. If you are curious about iOS development and want to know what it is like to get into iOS development, this is a perfect event for you. If already know some iOS development, this may be helpful to you too to meet some other iOS developers and maybe get guidance about how to become a professional iOS developer. People of all background is welcome, no programming background is necessary.
Pizza will be served for lunch. This event is fee, but the attendance is limited to 15 persons only. Please bring your own Mac laptop, if you want to practice with the class. You should have the latest version of Xcode installed. If you have question about installing Xcode, feel free to contact the organizer. |
Saturday
Aug 5, 2017
|
Portland iOS (iPhone) App Development Group - Machine Learning in Swift4, an open discussion Oregon Technology Buisiness Center (OTBC) Machine Learning is a hot buzz word now and the new version of Swift will have ML library. It is an exciting news. I am not any expert on ML, but hoping to learn more about it and how to use it in iPhone apps. I invite all iOS developers in the group who has been curious about the feature and may be already have done some studies in the area, to come to this open discussion session. If anyone is willing to put up a presentation (ppt or video) containing their knowledge in the area, that is welcome too. We have a big screen for projection in this facility. |
Wednesday
Oct 4, 2017
|
Portland SaaS Founders - Developing high functioning software teams for SaaS – US Custom House / WeWork We're all faced with the challenge of creating an awesome software product for our customers. A big part of this is having a highly functional software development team.
In this Meetup we'll discuss: • When to develop software in-house versus outsourcing or partnering with another software platform. Some SaaS companies utilize a mix of in-house and outsourced developers. We'll brainstorm various possible approaches. • How do you train new developers? What approaches have been successful and what has been a dismal failure? - Does it make sense to hire senior developers only or a mix of junior and senior developers? • Team / project organization - Do you do daily standups? How do your organize sprints? How are deadlines established and by whom? Is your team in the same office or are some remote? What tools do you use (Slack, Trello, etc.)? With all of the bugs, feature requests, UI overhauls, when do you ship updates to the product? • Communication and transparency - How do you speak to the rest of the team in a language everyone understands? Do you hold weekly/bi-weekly meetings to announce progress? How do you showcase new features to clients? Coffee, tea and draft beer will be provided. Come hang out with other SaaS founders and share your story!
|
Saturday
Jan 13, 2018
|
PASCAL Hackerspace - PASCAL Open Day PASCAL Join PASCAL on Saturday the 11th of November for a day of tours, entertainment and dialogue.
Drop on by if you would like to: Basic concessions will also be available! |
Tuesday
Jan 30, 2018
|
Google Development Group (GDG) PDX Meetup - Tell great data stories with Data Studio – eBay Community Lounge • What we'll do
• What to bring • Important to know |
Saturday
Sep 22, 2018
|
PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn – 226 SE Madison St Hack2Learn is a monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Questions? email [masked], or leave a comment on the meetup page (though we tend to not check that as often.) |
Saturday
Sep 29, 2018
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at Portland's only non-profit hackerspace are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!
After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for a new bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool. |
Saturday
Oct 6, 2018
|
PASCAL Hackerspace - 802.11x Total Domination via Warwalking through PASCAL Hackers of the night- unite! There are many cliches revolving around hackers and hacker culture that are, well, true. For example, we are night owls; we thrive in the night and do our best work in the dark. We use caffeine as our main source of energy and Sour Patch Kidz as our main source of nutrition. We wear black hoodies and carry backpacks full of gear as we stalk through night, avoiding the moonlight and sticking to the shadows as we totally, completely, and utterly ravage the city's WiFi!
Speaking of gear, here is a general list of items you will need to participate in this quest for[masked]x Total Domination: an Android phone (rooted or not rooted, with or without Kali installed BUT! You will probably want a rooted Android device because you will need monitor mode. You can skip the rooting and use a Raspberry Pi 3 and ssh into it with a non rooted phone via a terminal app), pretty much any Alpha radio, omni & directional antennae, and an insatiable appetite for learning. If you do not have access to or do not have time to acquire all or some of the gear listed- do not fret. Stay calm, and warwarlk on. Actually, just let us know what you are missing or which item you would like to test out and we will do our best to provide (you can let us know via Meetup, actually, by answering the question when you RSVP..this is one of those rare instances in which the question isn't totally superfluous.) MOAR DETAILS Questions? Find us on Wire Encrypted Messaging app (it's like Slack but encrypted!) and send a connection request to MrDe4d (@mrdead) or Wireglitch (@wireglitch). You can also email us at [masked] or [masked] or [masked]. |
Monday
Oct 8, 2018
|
ChickTech: Portland - ChickTech: Volunteer to inspire girls to become technologists – ChickTech Office Every year, ChickTech gives 150 local girls the opportunity to attend a weekend long inspiring technology camp. Girls are nominated by their teachers, then surprised with acceptance packets that illuminate their potential. Join a group of ChickTech volunteers in stuffing acceptance packets! We will gather at the ChickTech office, eat light snacks, and chat while we work together to inspire the next generation of technologists. First-time volunteers and people of all genders are welcome!
Please meet at the building's enterance on SW 10th and Washington. A ChickTech representative will be there to greet you from 5:30-5:45. If you arrive late please call (949)[masked] to be let into the building. |
Thursday
Oct 11, 2018
|
PDX Tech + Pong - October Tech + Pong - AltSource Recruiting Open House – AltSource HQ Recruiting Open House and PDX Tech + Pong
We have a very special twist on our usual Tech + Pong event for October. Come join us on October 11th for Happy Hour to celebrate the opening of the new AltSource headquarters in SE Portland! If you currently work for a local tech company, are looking for a new job opportunity in tech, or if you are looking for ways to get more involved with the tech community here in Portland, this recruiting and networking event is for you! It’s a great opportunity to speak with hiring managers in a casual environment and learn more about the job openings at both Altsource and The Dyrt. Plus, there will be food, drinks, a DJ, giveaways and the usual ping-pong tournament! This event is completely free, but please RSVP so we can get a head count for food and drinks. Time: Tournament: Location: Sponsors: The Dyrt (think like Yelp for camping) - gives away outdoor gear for user submitted campground reviews. The Dyrt is looking Ember developers, React Native Mobile Developers and a UI/UX Designer (https://blog.thedyrt.com/jobs/working-at-the-dyrt/) |
Saturday
Oct 13, 2018
|
PASCAL Hackerspace - PASCAL Open Day – PASCAL Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.
Drop on by if you would like to: Basic concessions will also be available! |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL Week of October 13th we will be focusing on METASPLOIT! Mooooo.
This Saturday at PASCAL we are offering the Hacker Symposium featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday! After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for this bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2 weeks after, at which point we will continue the series until we have completed a thorough review of each tool. |
|
Saturday
Oct 20, 2018
|
PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn – 226 SE Madison St Hack2Learn is a monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Questions? Send an email to [masked], or leave a comment on the meetup page (though we tend to not check that as often.) |
Saturday
Oct 27, 2018
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!
After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for a new bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool. |
Saturday
Nov 17, 2018
|
PASCAL Hackerspace - Hacking $mart Contracts – PASCAL Exciting news, Pascalians! PASCAL Hackerspace will be hosting the world-renowned Dean Pierce for a presentation and workshop on hacking smart contracts!! Come learn about the basic concepts surrounding smart contracts and the latest in keeping them secure!
What to expect during a Dean Pierce presentation: knowledge, verbs, adjectives, human hand gestures, an insider look at how smart contracts are created and how they are manipulated, lulz, and if we are lucky, maybe he will shed some light on how smart contract hacks can be applied to one of PASCAL's favorite pastimes- CTFs (fingers crossed this may be included in the workshop portion.) A bit more about Dean. Dean is an OG Portland hacker and definitely a human. When he isn't making and breaking blockchainz, he's out doing human things such as bipedal walking, eating a food and consuming oxygen. We hope to see you there! |
Saturday
Dec 1, 2018
|
PASCAL Hackerspace - Foundations: SSH Fundamentals – PASCAL SSH is the protocol that makes possible the secure administration of remote Unix-like systems. Any aspiring Linux hacker would do well to understand a little bit about how SSH works, and what it can do.
In this presentation, we're taking you through the basics of the ubiquitous OpenSSH implementation. We're going to cover the SSH client, the server, keys, best practices, and useful features like tunneling. To participate in the interactive portion of the event, bring a laptop that runs MacOS, or Linux either natively or in a virtual machine. As a supplement, we will be distributing digital copies of SSH Mastery by Michael Lucas. Please RSVP if you're coming, and let us know if you can't make it so we can make room for others. |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool. |
|
Thursday
Jan 17, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! Pt.2 – 226 SE Madison St Hack2Learn: Hackers, Assemble! (Part 2)
Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. For the next Hack2Learn workshop (yes, we are finally getting this event rolling again!), we will be taking a crack at Assembly-focused CTF (Capture The Flag) challenges: specifically, the PICOCTF2018 Note: Running Linux is not absolutely necessary when using Cutter. Both Windows and Mac are suitable and Cutter will run fine. Cutter still definitely has a learning curve to it.. fortunately, there is an excellent tutorial/intro on Megabeets.net! Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Thursday
Jan 24, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. First Session's Theme: Analysis Foundations What is an algorithm, besides a scary word? Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
Jan 26, 2019
|
PASCAL Hackerspace - Going Commando! – 226 SE Madison St That's right, watch some guy stand up in front of a room of people and go full commando! Whoa, don't get too excited there. I will be wearing clean...ish undergarments. By "going commando", I am referring to conducting any and all of your everyday computing tasks from the command line! Everything from being productive in an office environment to posting the twitters and streamin' the youtubes! Why, you ask? We are all hackers here aren't we? And what hacker doesn't want to look as cool in real life as we do in the movies? So come and enjoy all the typie-typie carpal tunnel goodness!
Joe Cathell (that's Ca-THELL, not cat+hell..even though Joe is something of a crazy cat man) is an infosec professional at the Washington University in St. Louis. When he's not defending our next generation of doctors from Russian hackers (true story, ask him!), he can usually be found at the Arch Reactor Hackerspace. Joe is both a founding member of Arch Reactor and serving as the current president of the board of directors. He is also a co-organizer of the monthly STL2600 and DC314 meetup, as well as a regular presenter. He likes blue raspberry Icees, building robots and competitive butter sculpting. |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
|
Saturday
Feb 2, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Wednesday
Feb 6, 2019
|
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Some Teams are Red, Others are Blue, I Play Defense, and So Can You!
An endpoint security primer in three (?-ish) parts. Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management. Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options. Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity. Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes. Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like: This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events! This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...) |
Thursday
Feb 7, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. First Session's Theme: Analysis Foundations What is an algorithm, besides a scary word? Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
Feb 9, 2019
|
PASCAL Hackerspace - PASCAL Open Day – PASCAL Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.
Drop on by if you would like to: Basic concessions will also be available! |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
|
Saturday
Feb 16, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Monday
Feb 18, 2019
|
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn. – PASCAL Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!
The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice. The goal is not to present a tutorial. The goal is to have discussion around the the process of breaking the problem down into specific use cases and requirements i.e. tasks that can be more easily implemented. The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill. There will be a focus on performing code review and encouraging people to demo their progress to the group. Session_0 will focus on the following: >Help individuals setup their development environment For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace. For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/ |
Thursday
Feb 21, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. First Session's Theme: Analysis Foundations What is an algorithm, besides a scary word? Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
Feb 23, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Thursday
Feb 28, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! – 226 SE Madison St Hack2Learn: Hackers, Assemble! (Part 2)
Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. For the next few Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges. MrDe4d will be walking everyone through these challenges, step by step (pun!) so that everyone in attendance will gain theoretical as well as applicable knowledge. Note: Running Linux is not absolutely necessary when using Cutter. Both Windows and Mac are suitable and Cutter will run fine. Cutter still definitely has a learning curve to it.. the tutorial/intro on Megabeets.net is recommended. Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Saturday
Mar 2, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Wednesday
Mar 6, 2019
|
GraphQLPDX - GraphQL PDX - GraphQL and Gatsby – Phase 2 Tonight we will have a presentation from Jason Lengstorf from Gatsby on. As always we will also have time to connect with others in the GraphQL community, talk about what you are tinkering with, problems you are encountering, and more. See you there.
Talk Details Title: Why does Gatsby use GraphQL? Gatsby is a framework for generating apps and websites that are fully static. Why, then, does it use GraphQL? In this talk, Jason Lengstorf will dive into the challenges of managing data for complex sites and how GraphQL allows Gatsby to manage this complexity more effectively. Speaker Details Jason Lengstorf is a developer advocate, senior engineer, and occasional designer at Gatsby. He’s an advocate for building highly productive teams through better communication, well designed systems and processes, and healthy work-life balance, and he blogs about that sometimes. He lives in Portland, Oregon. |
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Some Teams are Red, Others are Blue, I Play Defense, and So Can You!
An endpoint security primer in three (?-ish) parts. Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management. Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options. Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity. Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes. Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like: This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events! This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...) |
|
Saturday
Mar 9, 2019
|
PASCAL Hackerspace - PASCAL Open Day – Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.
Drop on by if you would like to: Basic concessions will also be available! |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
|
Wednesday
Mar 13, 2019
|
PASCAL Hackerspace - Waffle 0day Jubilee – PASCAL Waffle 0day is upon us!
Come celebrate the superiority of this human food in all of its square glory. Pancakes? pfft. Crepes? sac de barf. Lefse? lolwut. Waffles are the preferred and unofficial dietary supplement of hackers in the Portland area, and this day is to commemorate our life long dedication to the Square Beyond Compare (huh? what's that? some waffles are round you say? Guess what- they're still comprised of many smaller squares! Deal with it!). Members of PASCAL will be providing waffle noms and beverages, bringing their best batter and facing off with other Titans of the Square in the March edition of Waffle 0day Jubilee! There will also be music or a movie, games and fun/bizarre conversation centering around topics such as "Why Pancakes are the Inferior Multidimensional Array", "Why Crepes Don't Stack Up", and "Why Stack and Array Puns are on the Rise". Be there, or be symmetrically quadrilateral. |
Saturday
Mar 16, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Monday
Mar 18, 2019
|
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn. – PASCAL Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!
The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice. The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented. The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill. There will be a focus on performing code review and encouraging people to demo their progress to the group. Session_0 will focus on the following: >Help individuals set up their development environment For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace. For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/ |
Wednesday
Mar 20, 2019
|
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Some Teams are Red, Others are Blue, I Play Defense, and So Can You!
An endpoint security primer in three (?-ish) parts. Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management. Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options. Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity. Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes. Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like: This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events! This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...) |
Thursday
Mar 21, 2019
|
PASCAL Hackerspace - AlgoBytes: Rust Edition! – PASCAL One of the core goals of PASCAL is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. This session we have a very talented guest speaker. Talk Abstract: Rust is a new systems programming language, designed to compete with C and C++. Rust ensures memory and thread safety, with minimal (often zero) overhead. Rust brings many modern comforts to systems programming, like dependency management and an extensive public package registry. Mozilla is rewriting portions of its Firefox web browser in Rust to improve its performance and security. In this talk, I'll explain the key design decisions that make Rust interesting, and do some live coding to give a sense of what the language is like to work with. Speaker Bio: Jim Blandy has been a professional programmer for 28 years, working for the Free Software Foundation, Red Hat, and Mozilla. He has been a maintainer of GNU Emacs, GNU Guile, and the GNU Debugger (GDB), and is one of the original designers of the Subversion version control system. He is a co-author of the book Programming Rust from O'Reilly. He is a member of the Developer Tools team at Mozilla. |
Saturday
Mar 23, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Tuesday
Mar 26, 2019
|
PASCAL Hackerspace - Network Forensics: Seek and Pwn – PASCAL PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!
The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! The focus will predominantly be on TCP/IP and the OSI model computer networks. Layers, abstraction and encapsulation will be covered as well as the various physical and data link layers of each model. Each of the TCP/IP and OSI layers will be explained in detail, with some extra special attention being paid to the Transport Layer and its packets! The end of the presentation will culminate in a hands-on workshop. Attendees will get assistance with installing Wireshark (if you do not already have it)- then proceed with live Network Forensics Seek and Pwn: capture, investigate, analyze! Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them. |
Thursday
Mar 28, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! – 226 SE Madison St Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge. Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Saturday
Mar 30, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Monday
Apr 1, 2019
|
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn. – PASCAL Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!
The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice. The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented. The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill. There will be a focus on performing code review and encouraging people to demo their progress to the group. Session_0 will focus on the following: >Help individuals set up their development environment For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace. For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/ |
Wednesday
Apr 3, 2019
|
GraphQLPDX - GraphQLPDX - Converting a REST API to GraphQL – Phase 2 Hello everyone. It's time for another awesome GraphQLPDX meetup. Craig Buchanan will be giving a presentation on converting a REST API to GraphQL as well as some other related topics. For more details see the abstract below. There will also be plenty of time to talk to others about GraphQL, float questions you may have, and more.
Interested in giving a lightning talk or longer presentation about something you have been tinkering with or something you have learned about GraphQL? This is a great low key place to share knowledge amongst each other. May is wide open right now. Connect with Daniel and we will make it happen. Topic Abstract: From controllers to resolvers, and JSON views to schemas, this talk shows how to convert a Phoenix application (https://phoenixframework.org/) from a traditional REST API to a GraphQL API using the popular Absinthe toolkit (https://absinthe-graphql.org/). Benefits include: typesafe user input, automatically documented API, and mitigation against the dreaded N+1 query problem. |
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Some Teams are Red, Others are Blue, I Play Defense, and So Can You!
An endpoint security primer in three (?-ish) parts. Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management. Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options. Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity. Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes. Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like: This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events! This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...) |
|
Thursday
Apr 4, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. First Session's Theme: Analysis Foundations What is an algorithm, besides a scary word? Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
Apr 6, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Tuesday
Apr 9, 2019
|
PASCAL Hackerspace - Network Forensics: Seek & Pwn – PASCAL PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!
Network Forensics Seek and Pwn: capture, investigate, analyze! The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs. For the second edition of Network Pwnage, we will be diving into Layer As usual, there will be a short (30-40 minute) presentation of (I'm going to have to play around a bit to find the right tool set for Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them. |
Thursday
Apr 11, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! – 226 SE Madison St **NOTE**
While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday! END NOTE Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge. Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Monday
Apr 15, 2019
|
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn. – PASCAL Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!
The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice. The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented. The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill. There will be a focus on performing code review and encouraging people to demo their progress to the group. Session_0 will focus on the following: >Help individuals set up their development environment For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace. For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/ |
Tuesday
Apr 16, 2019
|
PASCAL Hackerspace - GNS3: A Primer – PASCAL Have you ever wanted to put together a network mockup? A networking lab? Perhaps you'd like to simply practice networking concepts or learn more about how a specific brand or device functions?
This class will provide an introduction to GNS3, a powerful network emulation platform. Attendees will review the setup/configuration of GNS3 and a couple applications by examinating a simple network example and a cybersecurity example with a Q&A session to wrap it up. |
Wednesday
Apr 17, 2019
|
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Some Teams are Red, Others are Blue, I Play Defense, and So Can You!
An endpoint security primer in three (?-ish) parts. Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management. Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options. Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity. Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes. Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like: This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events! This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...) |
Thursday
Apr 18, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!
AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. Theme: Hashes & Hashing. Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
Apr 20, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Tuesday
Apr 23, 2019
|
PASCAL Hackerspace - Network Forensics: Seek & Pwn – PASCAL PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!
Network Forensics Seek and Pwn: capture, investigate, analyze! The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs. For the second edition of Network Pwnage, we will be diving into Layer As usual, there will be a short (30-40 minute) presentation of (I'm going to have to play around a bit to find the right tool set for Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them. |
Thursday
Apr 25, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! – 226 SE Madison St **NOTE**
While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday! END NOTE Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge. Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Saturday
Apr 27, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Wednesday
May 1, 2019
|
GraphQLPDX - GraphQLPDX - Hangout and QA – Phase 2 Hello fellow Graphers. This month will be a low key opportunity to come and hang out with others interested in GraphQL. Come share what you have been working on, ask questions if you need help, or just hang out.
Are you interested in giving a presentation or lightning talk on something you have been tinkering with or learned? We are always looking for more presentations. It’s a pretty low key group. Reach out to Daniel and we will make it happen. |
Thursday
May 2, 2019
|
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers! – PASCAL Topic: Review of material so far by student request: Big O, arrays, linked lists, hashing and hashes.
PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that! AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher. Each 60 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, usually followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required. Topics announced about 2 weeks in advance Please bring your preferred note-taking device(s) and preferred scratch paper. A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required. The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security- Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh. Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter. |
Saturday
May 4, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Tuesday
May 7, 2019
|
PASCAL Hackerspace - Network Forensics: Seek & Pwn – PASCAL PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!
Network Forensics Seek and Pwn: capture, investigate, analyze! The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs. For the 4th session of Network Pwnage, we will be diving into Layer 4, TCP/UDP/ICMP. Having gotten this high in the stack, we'll start to do some serious packet capture analysis, so bring a laptop with Wireshark installed. As usual, there will be a short (30-40 minute) presentation of Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them. |
Thursday
May 9, 2019
|
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! – 226 SE Madison St **NOTE**
While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday! For the second part of this hardware challenge, we will be taking an indepth look at the device ROM and MCU. We will be using the MiniPro chip reader, and again working with TTL converters. END NOTE Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge. Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite). |
Saturday
May 11, 2019
|
PASCAL Hackerspace - PASCAL Open Day – Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.
Drop on by if you would like to: Basic concessions will also be available! |
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
|
Wednesday
May 15, 2019
|
PASCAL Hackerspace - Defensive Security: what can blue do for you? – 226 SE Madison St Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults, security through proper configuration, and small/medium scale distribution and management.
******** DefSec 0x05: Ansible, Part 1 Dive deep into the Dirac Sea...of security automation! Let's talk about Ansible (the RedHat automation/configuration management tool, not the scifi FTL machine). To quote a different introductory course, "Ansible is an automation and configuration management technology used to provision, deploy, and manage compute infrastructure across cloud, virtual, and physical environments." This initial session will focus on: Part 2 of this talk (coming soon!) will focus on a practical application of Ansible, namely deploying the Ubuntu Linux CIS benchmark against multiple virtual machines for hardening purposes. This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant. Probably.) He does security analysis and automation for profit, and systems thinking and other security-related things for fun. Uses obtuse prose. Talks fast and loud. Dreams of eliminating sleep. Protoypes the future. |
Saturday
May 18, 2019
|
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium – PASCAL This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!
We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). |
Wednesday
Jun 5, 2019
|
GraphQLPDX - GraphQLPDX - Presentation Evening – Phase 2 Tonight we will have a presentation by Sean Grove from OneGraph. As always we will also have time to connect with others in the GraphQL community, talk about what you are tinkering with, problems you are encountering, and more. See you there.
Are you interested in giving a presentation or lightning talk on something you have been tinkering with or learned? We are always looking for more presentations. It’s a pretty low key group. Reach out to Daniel and we will make it happen. Speaker Details Sean's been convinced there are better ways to develop applications across the stack for years, and built time-traveling debuggers, interface builders, layout tools, and graphic design tools in his quest to explore the space. His company was the first to deploy ClojureScript's Om library to a production app in early 2014, he helped lay the architecture for CircleCI's open-source frontend app and precursorapp.com, built systems to support tens of millions of dollars in transactions, and most recently founded OneGraph, a single GraphQL endpoint for all your most important APIs. |
Wednesday
Aug 7, 2019
|
GraphQLPDX - GraphQLPDX - Lightning Talks & Connecting with GraphQLers – Phase 2 Hey everyone. We are back for August. Tonight we will have some lightning talks and plenty of time to discuss what you have been tinkering or building.
Want to give a lightning talk on GraphQL? Connect with Daniel in the comments or @dslemay on Twitter. It's a super low key group and we all have knowledge to share. Looking forward to seeing you then. |
Wednesday
Sep 4, 2019
|
GraphQLPDX - GraphQLPDX Meetup – Phase 2 Hey all. Welcome to another GraphQLPDX meetup. Come get together with other GraphQL enthusiasts and those interested in the technology to have some food and chat all things GraphQL, other tech welcome too :).
If you are interested in giving a lightning talk or discussing something cool you have learned about GraphQL at this month's meetup or in the future, please reach out to Daniel on meetup or @dslemay on Twitter. Hope to see you there. |