Viewing 3 current events matching “network security” by Event Name.

Sort By: Date Event Name, Location , Default
Tuesday
Apr 30
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
May 28
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jun 25
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website

Viewing 109 past events matching “network security” by Event Name.

Sort By: Date Event Name, Location , Default
Tuesday
Mar 31, 2020
[Canceled] RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

March meeting has been canceled, we are exploring options for a virtual meetup in April.

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Apr 28, 2020
[Virtual] RainSec - PDX Information Security Meetup
Online (Portland)

URL: https://meet.jit.si/PDXRainSec042820 - Password: hunter2.

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Friday
Oct 7, 2022
BSidesPDX 2022 - Computer Security Conference
PSU Smith Memorial Student Union

We're looking forward to seeing you at BSidesPDX on Friday October 7, 2022 for our tenth annual conference. Registration is free through September 30th!

BSides Portland is a tax-exempt charitable 501(c)(3) organization founded with the mission to cultivate the Pacific Northwest information security and hacking community by creating local inclusive opportunities for learning, networking, collaboration, and teaching.

As this is an indoor event, we are requiring that all participants of BSidesPDX wear a mask while inside of conference spaces for the entirety of the event, except when you are 1) actively eating or drinking; or 2) a presenter actively giving your talk/workshop. Masks must be worn completely over both your mouth and nose.

Website
Friday
Oct 6, 2023
BSidesPDX 2023 - Computer Security Conference
through PSU Smith Memorial Student Union

We're looking forward to seeing you at BSidesPDX on Friday October 6th, 2023 for our annual conference. Registration is free through September 15th!

BSides Portland is a tax-exempt charitable 501(c)(3) organization founded with the mission to cultivate the Pacific Northwest information security and hacking community by creating local inclusive opportunities for learning, networking, collaboration, and teaching.

Website
Tuesday
Aug 28, 2018
Choosing the right router for each client
Max's Fanno Creek Brew Pub

Choosing the right router for each client

Routers, we've all got them. We install them. How do we choose the right one? How do we balance security and price for different clients? Routers have many features which are useful in some situations but worthless in others. How do we match our client needs to the right router?

Christian Martin will lead a discussion of the various features of the routers we install and how well they work. We will discuss which routers actually have particular features and how difficult it is to use them. We hope to utilize the experiences of everyone in attendance. Members who have knowledge of Asus, Meraki, Netgear, SonicWall, Ubiquiti, and Uplevel Systems routers will share their experiences to get things started.

We will cover:
+ Maintenance and updating How is it managed, frequency of updates, are updates automated
+ Remote Access What options are available; VPN Client (IPSec, L2TP, SSL), Site-to-site
+ Advanced features DPI, DPI SSL, Content Filtering, configurable ports, QoS, VLANs
+ Performance Real-world throughput you can expect with and without advanced features enabled

If you will help us by sharing your experience with some routers, please come prepared with the model number, so we correctly identify the router with the features we talk about.

Agenda:
6:00--6:20 Networking
6:20--7:00 No-host dinner
7:00--7:30 Introductions and announcements
7:30--8:30 Main Presentation (followed by Q&A)

Presented by:
Christian Martin, a Senior Consultant and owner of Denali, has over 20 years of experience in the IT field. He provides both IT advising and technical support to small and medium-sized businesses. Christian is also President of the OCCA.

Website
Wednesday
Jul 19, 2017
Network Security Simplified
APCON

Network security is becoming increasingly prominent in today’s world. Ever wonder about malware, cybersecurity, ransomware or cloud technologies and how they relate to you? Please join us for a networking event where we break down industry terms and trends.

This event will bring together creative and dynamic professionals who are passionate about securing today’s digital world while combating tomorrow’s cyber threats.

Come meet the team, network with peers and learn more about who we are. Light appetizers and beverages will be served.

For additional information please call 1-800-624-6808 or email [email protected].

Register today: https://www.apcon.com/registration-network-security-simplified-july-19-2017

Website
Saturday
Oct 6, 2018
PASCAL Hackerspace - 802.11x Total Domination via Warwalking
through PASCAL

Hackers of the night- unite! There are many cliches revolving around hackers and hacker culture that are, well, true. For example, we are night owls; we thrive in the night and do our best work in the dark. We use caffeine as our main source of energy and Sour Patch Kidz as our main source of nutrition. We wear black hoodies and carry backpacks full of gear as we stalk through night, avoiding the moonlight and sticking to the shadows as we totally, completely, and utterly ravage the city's WiFi!

Speaking of gear, here is a general list of items you will need to participate in this quest for[masked]x Total Domination: an Android phone (rooted or not rooted, with or without Kali installed BUT! You will probably want a rooted Android device because you will need monitor mode. You can skip the rooting and use a Raspberry Pi 3 and ssh into it with a non rooted phone via a terminal app), pretty much any Alpha radio, omni & directional antennae, and an insatiable appetite for learning.

If you do not have access to or do not have time to acquire all or some of the gear listed- do not fret. Stay calm, and warwarlk on. Actually, just let us know what you are missing or which item you would like to test out and we will do our best to provide (you can let us know via Meetup, actually, by answering the question when you RSVP..this is one of those rare instances in which the question isn't totally superfluous.)

MOAR DETAILS
Warwalking is similar to Wardriving except we take to the city on foot, not in a vehicle. Your hand/eye/foot coordination will be put to the ultimate test as you try not to trip and fall and result in a 9gag meme while passively collecting node and AP data. Which brings me to a very important point that you may have been wondering about...YES! IT IS LEGAL! As mentioned, warwalking and wardriving is the act of PASSIVELY collecting data, and sometimes taking note of this data (check out warchalking for lulz.)
We will meet at PASCAL Hackerspace at 11pm/2300hrs, and be headed out, on foot, at 11:30pm sharp after doing a gear check and making sure everyone is pumped! In case you are new to the Portland area, be warned that light rain is to be expected any time, anywhere and you should be sure you're wearing comfortable clothing. Also, we will not make fun of you if you decide to go full RPG-mode (Cylon has been known to dress head to toe as Aiden Pierce for no other reason than he felt like it and it is fun!) So, dust off your combat boot/trench coat ensemble and be Neo for a night! Or keep it simple with thick prescription sunglasses and work it like Whistler! Ok, I'm done alliterating...

Questions? Find us on Wire Encrypted Messaging app (it's like Slack but encrypted!) and send a connection request to MrDe4d (@mrdead) or Wireglitch (@wireglitch). You can also email us at [masked] or [masked] or [masked].

Website
Thursday
Jan 24, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

First Session's Theme: Analysis Foundations

What is an algorithm, besides a scary word?
I'm a practical person, why do I care?
What is a data structure?
What is complexity analysis?
What is Big O? Big Theta? Big Omega?
How do I apply them?

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
Feb 7, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

First Session's Theme: Analysis Foundations

What is an algorithm, besides a scary word?
I'm a practical person, why do I care?
What is a data structure?
What is complexity analysis?
What is Big O? Big Theta? Big Omega?
How do I apply them?

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
Feb 21, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

First Session's Theme: Analysis Foundations

What is an algorithm, besides a scary word?
I'm a practical person, why do I care?
What is a data structure?
What is complexity analysis?
What is Big O? Big Theta? Big Omega?
How do I apply them?

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
Apr 4, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

First Session's Theme: Analysis Foundations

What is an algorithm, besides a scary word?
I'm a practical person, why do I care?
What is a data structure?
What is complexity analysis?
What is Big O? Big Theta? Big Omega?
How do I apply them?

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
Apr 18, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 90 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

Theme: Hashes & Hashing.

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
May 2, 2019
PASCAL Hackerspace - AlgoBytes: Algorithms for Hackers!
PASCAL

Topic: Review of material so far by student request: Big O, arrays, linked lists, hashing and hashes.

PASCAL Hackerspace is happy to announce a new bimonthly workshop! One of the core goals of our organization is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

Each 60 minute session we will focus on a different topic, although we may repeat them if there are requests to revisit material. Currently there will be 20-30 minutes of presentation, a walk through of a problem, usually followed by breaking into small groups to practice. Attending sequential events is probably helpful if the material is new to you, but not required.

Topics announced about 2 weeks in advance

Please bring your preferred note-taking device(s) and preferred scratch paper.

A laptop with your editor & language of choice may be handy for trying out your solutions- especially important if you are prepping for technical interviews, but is not at all required.

The PASCAL board is excited to be hosting this event alongside a very accomplished and brilliant woman in security-

Allison Marie Naaktgeboren is a Senior Software Engineer. She has previously written (and regretted) code at Mozilla, Amazon, Cisco, FactSet Research Systems, and the Biorobotics Laboratory in Carnegie Mellon’s Robotics Institute. Allison holds a Bachelor’s Degree in Computer Science from Carnegie Mellon University in Pittsburgh.

Allison is a mentor in the PDXWiT mentorship program, supports the Women Who Code Portland Algorithms track, and mentors high school students in robotics and programming (Go Rebel @lliance!) She is a member of PASCAL & the OWASP Portland chapter.

Website
Thursday
Mar 21, 2019
PASCAL Hackerspace - AlgoBytes: Rust Edition!
PASCAL

One of the core goals of PASCAL is to provide educational opportunities to people in the information security and technical communities of Portland, and with AlgoBytes we get to do exactly that!

AlgoBytes is an informal workshop series to learn a bit more about the formal foundations of the field of computer science and about core data structures/algorithms frequently used for interviews, whether you've never explored them before or need a refresher.

This session we have a very talented guest speaker.

Talk Abstract:

Rust is a new systems programming language, designed to compete with C and C++. Rust ensures memory and thread safety, with minimal (often zero) overhead. Rust brings many modern comforts to systems programming, like dependency management and an extensive public package registry. Mozilla is rewriting portions of its Firefox web browser in Rust to improve its performance and security.

In this talk, I'll explain the key design decisions that make Rust interesting, and do some live coding to give a sense of what the language is like to work with.

Speaker Bio:

Jim Blandy has been a professional programmer for 28 years, working for the Free Software Foundation, Red Hat, and Mozilla. He has been a maintainer of GNU Emacs, GNU Guile, and the GNU Debugger (GDB), and is one of the original designers of the Subversion version control system. He is a co-author of the book Programming Rust from O'Reilly. He is a member of the Developer Tools team at Mozilla.

Website
Monday
Feb 18, 2019
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn.
PASCAL

Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!

The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice.

The goal is not to present a tutorial. The goal is to have discussion around the the process of breaking the problem down into specific use cases and requirements i.e. tasks that can be more easily implemented.

The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill.

There will be a focus on performing code review and encouraging people to demo their progress to the group.

Session_0 will focus on the following:

>Help individuals setup their development environment
>Make sure that the git workflow is well understood
>Help with a language selection
Note: while there will not be any prescribed languages,we suggest
either python or javascript. This is not to deter the use of other
languages. Just to suggest that there may be more help available using
something listed above.
>Help users install git for their operating system
>Help users create a github account and setup git to use it
>Help users install language and tooling (if needed)
>Help users install text editor and discuss the merits of different options

For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace.

For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/

Website
Monday
Mar 18, 2019
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn.
PASCAL

Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!

The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice.

The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented.

The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill.

There will be a focus on performing code review and encouraging people to demo their progress to the group.

Session_0 will focus on the following:

>Help individuals set up their development environment
>Make sure that the git workflow is well understood
>Help with a language selection
Note: while there will not be any prescribed languages,we suggest
either python or javascript. This is not to deter the use of other
languages. Just to suggest that there may be more help available using
something listed above.
>Help users install git for their operating system
>Help users create a github account and setup git to use it
>Help users install language and tooling (if needed)
>Help users install text editor and discuss the merits of different options

For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace.

For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/

Website
Monday
Apr 1, 2019
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn.
PASCAL

Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!

The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice.

The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented.

The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill.

There will be a focus on performing code review and encouraging people to demo their progress to the group.

Session_0 will focus on the following:

>Help individuals set up their development environment
>Make sure that the git workflow is well understood
>Help with a language selection
Note: while there will not be any prescribed languages,we suggest
either python or javascript. This is not to deter the use of other
languages. Just to suggest that there may be more help available using
something listed above.
>Help users install git for their operating system
>Help users create a github account and setup git to use it
>Help users install language and tooling (if needed)
>Help users install text editor and discuss the merits of different options

For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace.

For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/

Website
Monday
Apr 15, 2019
PASCAL Hackerspace - Build2Learn: Build It, And They Will Pwn.
PASCAL

Welcome to PASCAL Hackerspace's newest hands-on workshop: Build2Learn!

The general idea of the Build2Learn twice-monthly sessions is to take several categories of tools, analyze their functionality, and re-implement them using your language of choice.

The goal is not to present a tutorial. The goal is to have discussion around the process of breaking the problem down into specific use cases and requirements, i.e. tasks that can be more easily implemented.

The core goal of programming is problem solving, the aim here is to facilitate and encourage this skill.

There will be a focus on performing code review and encouraging people to demo their progress to the group.

Session_0 will focus on the following:

>Help individuals set up their development environment
>Make sure that the git workflow is well understood
>Help with a language selection
Note: while there will not be any prescribed languages,we suggest
either python or javascript. This is not to deter the use of other
languages. Just to suggest that there may be more help available using
something listed above.
>Help users install git for their operating system
>Help users create a github account and setup git to use it
>Help users install language and tooling (if needed)
>Help users install text editor and discuss the merits of different options

For more information, please visit-https://randy5235.github.io/build2learn/ or view the current repository directly on Github here: https://github.com/randy5235/build2learn . The purpose of this repository is to provide a resource for documentation and source code for the Build2Learn session(s) at PASCAL Hackerspace.

For questions regarding PASCAL Hackerspace and events hosted there in general, please email [masked]. For questions regarding Build2Learn, please reach out to Randy here on Meetup! He can be found here: https://www.meetup.com/members/10974695/

Website
Wednesday
Feb 6, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Some Teams are Red, Others are Blue, I Play Defense, and So Can You!

An endpoint security primer in three (?-ish) parts.
Part 1: MacOS
Part 2: Windows
Part 3: Linux

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management.

Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options.

Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity.

Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes.

Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like:
- hypervisors! and why trying to share memory has yet to be a good idea;
- how to do your best to secure them anyway;
- how and why you should deploy hardened and/or minimum viable configurations automatically (ansible, JAMF, AD/SCCM...)

This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events!

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...)
Magneto is: prototyping the future. trying to kill sleep. Security analysis and automation for profit. Other security-related things for fun. Obtuse prose. Dream job: Starship Captain. There's a reason for the nickname.

Website
Wednesday
Mar 6, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Some Teams are Red, Others are Blue, I Play Defense, and So Can You!

An endpoint security primer in three (?-ish) parts.
Part 1: MacOS
Part 2: Windows
Part 3: Linux

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management.

Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options.

Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity.

Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes.

Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like:
- hypervisors! and why trying to share memory has yet to be a good idea;
- how to do your best to secure them anyway;
- how and why you should deploy hardened and/or minimum viable configurations automatically (ansible, JAMF, AD/SCCM...)

This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events!

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...)
Magneto is: prototyping the future. trying to kill sleep. Security analysis and automation for profit. Other security-related things for fun. Obtuse prose. Dream job: Starship Captain. There's a reason for the nickname.

Website
Wednesday
Mar 20, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Some Teams are Red, Others are Blue, I Play Defense, and So Can You!

An endpoint security primer in three (?-ish) parts.
Part 1: MacOS
Part 2: Windows
Part 3: Linux

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management.

Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options.

Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity.

Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes.

Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like:
- hypervisors! and why trying to share memory has yet to be a good idea;
- how to do your best to secure them anyway;
- how and why you should deploy hardened and/or minimum viable configurations automatically (ansible, JAMF, AD/SCCM...)

This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events!

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...)
Magneto is: prototyping the future. trying to kill sleep. Security analysis and automation for profit. Other security-related things for fun. Obtuse prose. Dream job: Starship Captain. There's a reason for the nickname.

Website
Wednesday
Apr 3, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Some Teams are Red, Others are Blue, I Play Defense, and So Can You!

An endpoint security primer in three (?-ish) parts.
Part 1: MacOS
Part 2: Windows
Part 3: Linux

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management.

Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options.

Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity.

Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes.

Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like:
- hypervisors! and why trying to share memory has yet to be a good idea;
- how to do your best to secure them anyway;
- how and why you should deploy hardened and/or minimum viable configurations automatically (ansible, JAMF, AD/SCCM...)

This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events!

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...)
Magneto is: prototyping the future. trying to kill sleep. Security analysis and automation for profit. Other security-related things for fun. Obtuse prose. Dream job: Starship Captain. There's a reason for the nickname.

Website
Wednesday
Apr 17, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Some Teams are Red, Others are Blue, I Play Defense, and So Can You!

An endpoint security primer in three (?-ish) parts.
Part 1: MacOS
Part 2: Windows
Part 3: Linux

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults; what each operating system can bring to the table; security through proper configuration; and small/medium scale distribution and management.

Part 1: We'll start with a broad overview of securing endpoints, the classes of attacks that might be encountered depending on your use cases, and what it means to be "secure." Then, we'll talk about configuring macOS for reasonable security, beginning with the hardware chain of trust, moving through the bootloader and touching on what Apple's hw/sw integration allows for: Activation Locks, MDM/DEP, and Software Recovery. Moving up the stack, we'll discuss the tiers of built-in macOS software security, and if time permits, several third party options to strengthen endpoint options.

Part 2: Let's kick off with quick refresher on previous topics, and then dive right in to Windows endpoint security. Because of the diversity of hardware, there will be less low-level focus this session, but BitLocker, TPM, and OPAL will be in the mix. Then, learn why Secure Boot is not a conspiracy, how Hyper-V is bae, why Windows 10 is actually the best thing since... earlier Windows 10 releases!, what Group Policy can do for you, and which version of Windows is the minimum necessary for any kind of sanity.

Part 3: In the stolen words of Steve Ballmer, compartmentalize compartmentalize compartmentalize! We'll talk about mitigating inevitable compromise, and then move to Linux security. Coreboot, Heads, and refreshers from PC hardware kick us off, then it's into the wilderness! We'll try and nail down some best practices for the wide and varied world of Linux distros, the security benefits of containers, why Flatpak is awesome, and a quick touch on grsecurity (aka "why we can't have nice things"). If there's time, we'll even try to talk about the security benefits of other nix's like OpenBSD & Qubes.

Part 4: This is unwritten, unplanned and unscheduled, but part 4 (and 5, and beyond!) could include topics like:
- hypervisors! and why trying to share memory has yet to be a good idea;
- how to do your best to secure them anyway;
- how and why you should deploy hardened and/or minimum viable configurations automatically (ansible, JAMF, AD/SCCM...)

This is intended as a high-level overview to get a baseline for each of the three operating systems; content will change and grow based on feedback and requests. Come help me evolve my endpoint security game, and steer the course for future events!

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant...ok well, he could* be a mutant for all we know...)
Magneto is: prototyping the future. trying to kill sleep. Security analysis and automation for profit. Other security-related things for fun. Obtuse prose. Dream job: Starship Captain. There's a reason for the nickname.

Website
Wednesday
May 15, 2019
PASCAL Hackerspace - Defensive Security: what can blue do for you?
226 SE Madison St

Come learn about the other side of the cybersecurity equation: how to raise the bar for attackers trying to pwn your endpoints. This talk series will focus on sane, sensible, and usable defaults, security through proper configuration, and small/medium scale distribution and management.

********

DefSec 0x05: Ansible, Part 1

Dive deep into the Dirac Sea...of security automation!

Let's talk about Ansible (the RedHat automation/configuration management tool, not the scifi FTL machine). To quote a different introductory course, "Ansible is an automation and configuration management technology used to provision, deploy, and manage compute infrastructure across cloud, virtual, and physical environments." This initial session will focus on:
- a high-level overview of what Ansible is
- how it works
- beginning to use Ansible via ad-hoc commands
- reasoning + planning about tasks -> playbooks -> roles
- how you might deploy it at scale
- and finally, as time permits: hands on with playbooks!

Part 2 of this talk (coming soon!) will focus on a practical application of Ansible, namely deploying the Ubuntu Linux CIS benchmark against multiple virtual machines for hardening purposes.

This series is brought to you by PASCAL Hackerspace, and presented by Magneto (the hacker, not the mutant. Probably.) He does security analysis and automation for profit, and systems thinking and other security-related things for fun. Uses obtuse prose. Talks fast and loud. Dreams of eliminating sleep. Protoypes the future.

Website
Saturday
Dec 1, 2018
PASCAL Hackerspace - Foundations: SSH Fundamentals
PASCAL

SSH is the protocol that makes possible the secure administration of remote Unix-like systems. Any aspiring Linux hacker would do well to understand a little bit about how SSH works, and what it can do.

In this presentation, we're taking you through the basics of the ubiquitous OpenSSH implementation. We're going to cover the SSH client, the server, keys, best practices, and useful features like tunneling.

To participate in the interactive portion of the event, bring a laptop that runs MacOS, or Linux either natively or in a virtual machine.

As a supplement, we will be distributing digital copies of SSH Mastery by Michael Lucas.

Please RSVP if you're coming, and let us know if you can't make it so we can make room for others.

Website
Tuesday
Apr 16, 2019
PASCAL Hackerspace - GNS3: A Primer
PASCAL

Have you ever wanted to put together a network mockup? A networking lab? Perhaps you'd like to simply practice networking concepts or learn more about how a specific brand or device functions?

This class will provide an introduction to GNS3, a powerful network emulation platform.

Attendees will review the setup/configuration of GNS3 and a couple applications by examinating a simple network example and a cybersecurity example with a Q&A session to wrap it up.

Website
Saturday
Jan 26, 2019
PASCAL Hackerspace - Going Commando!
226 SE Madison St

That's right, watch some guy stand up in front of a room of people and go full commando! Whoa, don't get too excited there. I will be wearing clean...ish undergarments. By "going commando", I am referring to conducting any and all of your everyday computing tasks from the command line! Everything from being productive in an office environment to posting the twitters and streamin' the youtubes! Why, you ask? We are all hackers here aren't we? And what hacker doesn't want to look as cool in real life as we do in the movies? So come and enjoy all the typie-typie carpal tunnel goodness!

Joe Cathell (that's Ca-THELL, not cat+hell..even though Joe is something of a crazy cat man) is an infosec professional at the Washington University in St. Louis. When he's not defending our next generation of doctors from Russian hackers (true story, ask him!), he can usually be found at the Arch Reactor Hackerspace. Joe is both a founding member of Arch Reactor and serving as the current president of the board of directors. He is also a co-organizer of the monthly STL2600 and DC314 meetup, as well as a regular presenter. He likes blue raspberry Icees, building robots and competitive butter sculpting.

Website
Thursday
Feb 28, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble!
226 SE Madison St

Hack2Learn: Hackers, Assemble! (Part 2)

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next few Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges. MrDe4d will be walking everyone through these challenges, step by step (pun!) so that everyone in attendance will gain theoretical as well as applicable knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. A lot of people find Assembly intimidating..and while it may seem daunting and complicated at first glance but, as with any programming language, a grasp of logic as well as dedication to learning are all that are required. In addition to walking you through every step in each challenge, a relatively quick
intro to Assembly will be given, hopefully demystifying it a bit for everyone. MrDe4d will cover basic syntax, instructions and conditions. As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter often), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
In order to participate, attendees will need a computer and an install of Cutter 1.7.4 (a Radare2 GUI that can be used with Linux, Windows or Mac).

Note: Running Linux is not absolutely necessary when using Cutter. Both Windows and Mac are suitable and Cutter will run fine. Cutter still definitely has a learning curve to it.. the tutorial/intro on Megabeets.net is recommended.

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Thursday
Mar 28, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble!
226 SE Madison St

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. Throughout the series we will cover basic syntax, instructions, conditions, and more! As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
As we will be focusing on microcorruption CTF challenges for the next several workshops, it is not necessary to have Cutter or any other debugger installed. Microcorruption has its own web based debugger that is very easy to learn and use!

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Thursday
Apr 11, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble!
226 SE Madison St

**NOTE**

While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday!

END NOTE

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. Throughout the series we will cover basic syntax, instructions, conditions, and more! As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
As we will be focusing on microcorruption CTF challenges for the next several workshops, it is not necessary to have Cutter or any other debugger installed. Microcorruption has its own web based debugger that is very easy to learn and use!

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Thursday
Apr 25, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble!
226 SE Madison St

**NOTE**

While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday!

END NOTE

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. Throughout the series we will cover basic syntax, instructions, conditions, and more! As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
As we will be focusing on microcorruption CTF challenges for the next several workshops, it is not necessary to have Cutter or any other debugger installed. Microcorruption has its own web based debugger that is very easy to learn and use!

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Thursday
May 9, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble!
226 SE Madison St

**NOTE**

While we will continue to work on the microcorruption CTF for the next several Hack2Learn workshops, the next meetup we are going to take a side quest and focus on a very special challenge involving hardware. It will be our first crack at embedded device security as a group. For more details- come see PASCAL next Thursday!

For the second part of this hardware challenge, we will be taking an indepth look at the device ROM and MCU. We will be using the MiniPro chip reader, and again working with TTL converters.

END NOTE

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. Throughout the series we will cover basic syntax, instructions, conditions, and more! As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
As we will be focusing on microcorruption CTF challenges for the next several workshops, it is not necessary to have Cutter or any other debugger installed. Microcorruption has its own web based debugger that is very easy to learn and use!

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Thursday
Jan 17, 2019
PASCAL Hackerspace - Hack2Learn: Hackers, Assemble! Pt.2
226 SE Madison St

Hack2Learn: Hackers, Assemble! (Part 2)

Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!

For the next Hack2Learn workshop (yes, we are finally getting this event rolling again!), we will be taking a crack at Assembly-focused CTF (Capture The Flag) challenges: specifically, the PICOCTF2018
Assembly 0-2. MrDe4d will be walking everyone through these challenges, step by step (pun!) so that everyone in attendance will gain theoretical as well as applicable knowledge.
Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. A lot of people find Assembly intimidating..and while it may seem daunting and complicated at first glance but, as with any programming language, a grasp of logic as well as dedication to learning are all that are required. In addition to walking you through every step in each challenge, a relatively quick
intro to Assembly will be given, hopefully demystifying it a bit for everyone. MrDe4d will cover basic syntax, instructions and conditions. As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment!
H2L has two major goals: for everyone to capture the flags, and to learn to reverse engineer. This is not a workshop focused on learning a tool, rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer.
In order to participate, attendees will need a computer running either Linux (distro of choice though for this workshop Debian flavors are recommended) or Windows with a VM for Linux, & an install of Cutter 1.7.2 (a Radare2 GUI).

Note: Running Linux is not absolutely necessary when using Cutter. Both Windows and Mac are suitable and Cutter will run fine. Cutter still definitely has a learning curve to it.. fortunately, there is an excellent tutorial/intro on Megabeets.net!

Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).

Website
Saturday
Nov 17, 2018
PASCAL Hackerspace - Hacking $mart Contracts
PASCAL

Exciting news, Pascalians! PASCAL Hackerspace will be hosting the world-renowned Dean Pierce for a presentation and workshop on hacking smart contracts!! Come learn about the basic concepts surrounding smart contracts and the latest in keeping them secure!

What to expect during a Dean Pierce presentation: knowledge, verbs, adjectives, human hand gestures, an insider look at how smart contracts are created and how they are manipulated, lulz, and if we are lucky, maybe he will shed some light on how smart contract hacks can be applied to one of PASCAL's favorite pastimes- CTFs (fingers crossed this may be included in the workshop portion.)

A bit more about Dean. Dean is an OG Portland hacker and definitely a human. When he isn't making and breaking blockchainz, he's out doing human things such as bipedal walking, eating a food and consuming oxygen.

We hope to see you there!

Website
Saturday
Sep 22, 2018
PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn
226 SE Madison St

Hack2Learn is a monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!
For the first Hack2Learn meetup, we will walk you through the setup process, starting with installing a virtual machine and setting up a beginner friendly Linux environment (Kali counts as beginner friendly, right?), followed by a lightning lesson on command line. Once everyone is ready, we will dive right in to a STEMCTF challenge created by MITRE Cyber Academy. Basic understanding of at least one programming language and/or security concepts is helpful, but not necessary. Honestly, when we say all you need is a desire to learn, we mean it!
If you have a laptop, bring it. We have a handful of loaners for those who need them, as well as several desktop PCs for use at the hackerspace. So, brush off your social anxiety, leave your impostor syndrome at the door, and let your inner hacker take a crack at capture the flag- PASCAL edition!

Questions? email [masked], or leave a comment on the meetup page (though we tend to not check that as often.)

Website
Saturday
Oct 20, 2018
PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn
226 SE Madison St

Hack2Learn is a monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to all the various types of challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit.
Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this workshop at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn!
For the October edition of Hack2Learn, we will be focusing on web and binary challenges. First we will make sure everyone is set up with a virtual machine and the OS of their choice (though Kali is recommended, specifically for the web challenges). For the binary challenges we will install Cutter which is something of an intro to Radare2. You are encouraged to familiarize yourself with Cutter and R2 prior to the workshop; take a look--> https://github.com/radareorg/cutter (note: downloading a VM and/or installing a new OS is not necessary for using Cutter when working on the binary challenges, unless you're using Mac OS in which case you will need to spin up a VM for either Windows or Linux).
Basic understanding of at least one programming language and/or security concepts is helpful, but not necessary. Honestly, when we say all you need is a desire to learn, we mean it!
Cylon is setting up a wireless hacking station for October H2L as well, and will be offering some hands-on experience to anyone interested in the wonderful world of wireless hax!
If you have a laptop, bring it. We have a handful of loaners for those who need them, as well as a few desktop PCs for use at the hackerspace. So, brush off your social anxiety, leave your impostor syndrome at the door, and let your inner hacker take a crack at capture the flag!

Questions? Send an email to [masked], or leave a comment on the meetup page (though we tend to not check that as often.)

Website
Tuesday
Apr 9, 2019
PASCAL Hackerspace - Network Forensics: Seek & Pwn
PASCAL

PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!

Network Forensics Seek and Pwn: capture, investigate, analyze!

The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs.

For the second edition of Network Pwnage, we will be diving into Layer
2: ARP, RARP, GARP, VLAN tags and how to abuse them, cam tables, ARP
flooding, and how to turn your local switch into a hub for better
sniffing opportunities.

As usual, there will be a short (30-40 minute) presentation of
material and then a hands on lab/experimentation time to put our new
skills to use. Attendees are encouraged to bring a laptop to play
along.

(I'm going to have to play around a bit to find the right tool set for
this one, as https://www.monkey.org/~dugsong/dsniff/ is pretty old,
and there are several people who claim to have taken over the
project...)
--Malcolm

Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them.

Website
Tuesday
Apr 23, 2019
PASCAL Hackerspace - Network Forensics: Seek & Pwn
PASCAL

PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!

Network Forensics Seek and Pwn: capture, investigate, analyze!

The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs.

For the second edition of Network Pwnage, we will be diving into Layer
2: ARP, RARP, GARP, VLAN tags and how to abuse them, cam tables, ARP
flooding, and how to turn your local switch into a hub for better
sniffing opportunities.

As usual, there will be a short (30-40 minute) presentation of
material and then a hands on lab/experimentation time to put our new
skills to use. Attendees are encouraged to bring a laptop to play
along, and to have a VM with Linux (Kali is probably best, but choose your flavor!) or Mac OS as it is generally easier to work with layer 2 on these platforms.

(I'm going to have to play around a bit to find the right tool set for
this one, as https://www.monkey.org/~dugsong/dsniff/ is pretty old,
and there are several people who claim to have taken over the
project...)
--Malcolm

Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them.

Website
Tuesday
May 7, 2019
PASCAL Hackerspace - Network Forensics: Seek & Pwn
PASCAL

PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!

Network Forensics Seek and Pwn: capture, investigate, analyze!

The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! Each week the focus will shift to suit the attendees needs.

For the 4th session of Network Pwnage, we will be diving into Layer 4, TCP/UDP/ICMP.

Having gotten this high in the stack, we'll start to do some serious packet capture analysis, so bring a laptop with Wireshark installed.

As usual, there will be a short (30-40 minute) presentation of
material and then a hands on lab/experimentation time to put our new
skills to use.

Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them.

Website
Tuesday
Mar 26, 2019
PASCAL Hackerspace - Network Forensics: Seek and Pwn
PASCAL

PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics!

The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited!

The focus will predominantly be on TCP/IP and the OSI model computer networks. Layers, abstraction and encapsulation will be covered as well as the various physical and data link layers of each model. Each of the TCP/IP and OSI layers will be explained in detail, with some extra special attention being paid to the Transport Layer and its packets!

The end of the presentation will culminate in a hands-on workshop. Attendees will get assistance with installing Wireshark (if you do not already have it)- then proceed with live Network Forensics Seek and Pwn: capture, investigate, analyze!

Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them.

Website
Saturday
Jan 13, 2018
PASCAL Hackerspace - PASCAL Open Day
PASCAL

Join PASCAL on Saturday the 11th of November for a day of tours, entertainment and dialogue. 

Drop on by if you would like to: 
- Learn more about who PASCAL be, and what do PASCAL
- Start hacking stuff immediately
- Learn about current threats and how they work, or
- Simply mingle and have a relaxing afternoon with Infosec nerds.

Basic concessions will also be available!

Website
Saturday
Oct 13, 2018
PASCAL Hackerspace - PASCAL Open Day
PASCAL

Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.

Drop on by if you would like to:
- Learn more about who PASCAL be, and what do PASCAL
- Start hacking stuff immediately
- Learn about current threats and how they work, or
- Simply mingle and have a relaxing afternoon with Infosec nerds.

Basic concessions will also be available!

Website
Saturday
Feb 9, 2019
PASCAL Hackerspace - PASCAL Open Day
PASCAL

Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.

Drop on by if you would like to:
- Learn more about who PASCAL be, and what do PASCAL
- Start hacking stuff immediately
- Learn about current threats and how they work, or
- Simply mingle and have a relaxing afternoon with Infosec nerds.

Basic concessions will also be available!

Website
Saturday
Mar 9, 2019
PASCAL Hackerspace - PASCAL Open Day

Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.

Drop on by if you would like to:
- Learn more about who PASCAL be, and what do PASCAL
- Start hacking stuff immediately
- Learn about current threats and how they work, or
- Simply mingle and have a relaxing afternoon with Infosec nerds.

Basic concessions will also be available!

Website
Saturday
May 11, 2019
PASCAL Hackerspace - PASCAL Open Day

Join PASCAL on the second Saturday of the month for a day of tours, entertainment and dialogue.

Drop on by if you would like to:
- Learn more about who PASCAL be, and what do PASCAL
- Start hacking stuff immediately
- Learn about current threats and how they work, or
- Simply mingle and have a relaxing afternoon with Infosec nerds.

Basic concessions will also be available!

Website
Saturday
Sep 29, 2018
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at Portland's only non-profit hackerspace are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!

After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for a new bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool.
Questions? please email MrD34d--> [masked] or Cylon--> [masked]. We can also be found on the encrypted messaging app called Wire, which is available for desktop, Android and Apple devices (@mrdead or @wireglitch for invites to the PASCAL channel.)
PASCAL has snacks and drinks for some dollars and cents, though everyone is welcome to bring their own food and drink.
Final Note: if you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Oct 13, 2018
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

Week of October 13th we will be focusing on METASPLOIT! Mooooo.

This Saturday at PASCAL we are offering the Hacker Symposium featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!

After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for this bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2 weeks after, at which point we will continue the series until we have completed a thorough review of each tool.
Questions? please email MrD34d--> [masked] or Cylon--> [masked]. We can also be found on the encrypted messaging app called Wire, which is available for desktop, Android and Apple devices (@mrdead or @wireglitch for invites to the PASCAL channel.)
PASCAL has snacks and drinks for some dollars and cents, though everyone is welcome to bring their own food and drink.
Final Note: if you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Oct 27, 2018
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!

After (and probably during) this presentation, we will, as presenters and attendees, decide on which tool (or framework) to focus on for a new bi-monthly workshop. We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool.
Questions? please email MrD34d--> [masked] or Cylon--> [masked]. We can also be found on the encrypted messaging app called Wire, which is available for desktop, Android and Apple devices (@mrdead or @wireglitch for invites to the PASCAL channel.)
PASCAL has snacks and drinks for some dollars and cents, though everyone is welcome to bring their own food and drink.
Final Note: if you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Dec 1, 2018
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with MrDe4d, Cylon, Wireglitch and the rest of the misfit hackers of PDX this Saturday!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! The future workshop will be scheduled after all Q&A and demos are complete and will take place 2-4 weeks after, at which point we will continue the series until we have completed a thorough review of each tool.
Questions? please email MrDe4d--> [masked] or Cylon--> [masked]. We can also be found on the encrypted messaging app called Wire, which is available for desktop, Android and Apple devices (@mrdead or @wireglitch for invites to the PASCAL channel.)
PASCAL has snacks and drinks for some dollars and cents, though everyone is welcome to bring their own food and drink.
Final Note: if you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Jan 26, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Feb 2, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Feb 9, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Feb 16, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Feb 23, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Mar 2, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Mar 9, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Mar 16, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Mar 23, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Mar 30, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Apr 6, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Apr 20, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
Apr 27, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
May 4, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
May 11, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Saturday
May 18, 2019
PASCAL Hackerspace - Tools That Pwn: A Hacker Symposium
PASCAL

This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX!

We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within).
If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!

Website
Wednesday
Mar 13, 2019
PASCAL Hackerspace - Waffle 0day Jubilee
PASCAL

Waffle 0day is upon us!

Come celebrate the superiority of this human food in all of its square glory. Pancakes? pfft. Crepes? sac de barf. Lefse? lolwut. Waffles are the preferred and unofficial dietary supplement of hackers in the Portland area, and this day is to commemorate our life long dedication to the Square Beyond Compare (huh? what's that? some waffles are round you say? Guess what- they're still comprised of many smaller squares! Deal with it!).

Members of PASCAL will be providing waffle noms and beverages, bringing their best batter and facing off with other Titans of the Square in the March edition of Waffle 0day Jubilee!

There will also be music or a movie, games and fun/bizarre conversation centering around topics such as "Why Pancakes are the Inferior Multidimensional Array", "Why Crepes Don't Stack Up", and "Why Stack and Array Puns are on the Rise".

Be there, or be symmetrically quadrilateral.

Website
Monday
Dec 30, 2019
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

Note: We usually meet on the last Tuesday of the month, however we've shifted this meeting to prevent conflicts with New Years Eve plans.

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

You can also find us on Meetup.com and Google Groups.

Website
Tuesday
Jan 28, 2020
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

You can also find us on Meetup.com and Google Groups.

Website
Tuesday
Feb 25, 2020
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Sep 28, 2021
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because the Delta variant of COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • Masks are required to be worn over the mouth and nose while in the venue, except when eating or drinking.
  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Oct 26, 2021
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because the Delta variant of COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • Masks are required to be worn over the mouth and nose while in the venue, except when eating or drinking.
  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Nov 30, 2021
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because the Delta variant of COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • Masks are required to be worn over the mouth and nose while in the venue, except when eating or drinking.
  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Mar 29, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because the Delta variant of COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Apr 26, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
May 31, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Aug 2, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

Due to the excessive heat warning in Portland, this meeting has been rescheduled to Tuesday August 2nd

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Aug 30, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Sep 27, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Oct 25, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Nov 29, 2022
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jan 3, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

We miss all of you, and we look forward to seeing you as soon as it is safe for you to attend.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jan 31, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Feb 28, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Mar 28, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Apr 25, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
May 30, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jun 27, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jul 25, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Aug 29, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Sep 26, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Monday
Oct 30, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

The October meetup has been rescheduled from our usual last Tuesday (October 31st) to last Monday (October 30th) to prevent conflicts any attendee Halloween plans.

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Nov 28, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Dec 26, 2023
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Jan 30
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Feb 27
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Mar 26
RainSec - PDX Information Security Meetup
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to network and discuss topics of interest in a non-work, non-vendor setting.

While our target audience is experienced information security professionals, this is a public event open to any interested parties. If you have a friend or colleague who might benefit, please pass an invite along.

Follow @PDXRainSec on Twitter for last minute updates.

Because COVID-19 still presents significant risk to some members of our community, we ask that you observe the following and make your own risk assessment decision regarding your attendance:

  • If outdoor seating is available and weather permits, we will be outside.
  • If you are feeling sick, stay home!
  • If you've had a recent COVID exposure, stay home!
  • If you are not vaccinated, stay home!
  • If you are otherwise considered high risk for COVID, please stay home until you feel it is safe to gather in large groups (20-40 people). We don't want to be the cause of anyone's illness or death.

You can also find us on Meetup.com and Google Groups.

If you're looking for more security-focused community meetups in the Portland area, check out pdx-infosec.com.

Website
Tuesday
Apr 30, 2019
RainSec - Portland Information Security Professionals
Wedgehead

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Tuesday
May 28, 2019
RainSec - Portland Information Security Professionals
Wedgehead

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Tuesday
Jul 30, 2019
RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Tuesday
Aug 27, 2019
RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Tuesday
Sep 24, 2019
RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Tuesday
Oct 29, 2019
RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Tuesday
Nov 26, 2019
RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

Follow @PDXRainSec on Twitter for last minute updates.

Website
Tuesday
Sep 25, 2018
RainSec - RainSec - Portland Information Security Professionals
Lucky Lab Brew Pub

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Tuesday
Oct 30, 2018
RainSec - RainSec - Portland Information Security Professionals
Wedgehead

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Tuesday
Nov 27, 2018
RainSec - RainSec - Portland Information Security Professionals
Wedgehead

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Wednesday
Dec 26, 2018
RainSec - RainSec - Portland Information Security Professionals
Wedgehead

RainSec is an informal group of like-minded security professionals who meet to discuss topics of interest in a non-work, non-vendor setting. Preferably while drinking just enough to forget our day jobs.

This is a public event open to any interested parties, however our target audience is experienced information security professionals.

While we use meetup.com for the convenience of our members, most communication happens over the mailing list (https://groups.google.com/forum/#!forum/rainsec).

Follow @PDXRainSec for last minute updates.

Website
Tuesday
Aug 1, 2017
Vancouver Digital Security Meetup - Digital Security / forensics in the public sector
Coffee Revolution

What are some areas of strength, and concern in the public sector? 

Website