BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//Calagator//EN
CALSCALE:GREGORIAN
X-WR-CALNAME:Calagator
METHOD:PUBLISH
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20180311T020000
RDATE:20180311T020000
RDATE:20190310T020000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20181104T020000
RDATE:20181104T020000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20180919T070911Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20180922T220000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20180922T180000
DTSTAMP;VALUE=DATE-TIME:20180919T070911Z
LAST-MODIFIED;VALUE=DATE-TIME:20180919T070911Z
UID:http://calagator.org/events/1250474258
DESCRIPTION:Hack2Learn is a monthly CTF (capture the flag) meetup hosted 
 at PASCAL in Portland\, OR. PASCAL is an organization of equal opportuni
 ty hackers\, and we will be introducing you to all the various types of 
 challenges that you might face at any level\, and at any time in the fie
 lds of information security and technology as a whole\, for fun or profi
 t.Hacker/Tech culture and community can sometimes be a bit (or a byte ^_
 ^) off-putting\, especially to those trying to figure out what exactly i
 t is\, what we are and what we do. During this meetup at PASCAL\, we wel
 come n00bs with open arms! Never competed in a CTF challenge before? Nev
 er even heard of CTFs? Do you have a strong desire to learn &amp\; teach
  alongside peers? GOOD!! You will fit right in at Hack2Learn!For the fir
 st Hack2Learn meetup\, we will walk you through the setup process\, star
 ting with installing a virtual machine and setting up a beginner friendl
 y Linux environment (Kali counts as beginner friendly\, right?)\, follow
 ed by a lightning lesson on command line. Once everyone is ready\, we wi
 ll dive right in to a STEMCTF challenge created by MITRE Cyber Academy. 
 Basic understanding of at least one programming language and/or security
  concepts is helpful\, but not necessary. Honestly\, when we say all you
  need is a desire to learn\, we mean it!If you have a laptop\, bring it.
  We have a handful of loaners for those who need them\, as well as sever
 al desktop PCs for use at the hackerspace. So\, brush off your social an
 xiety\, leave your impostor syndrome at the door\, and let your inner ha
 cker take a crack at capture the flag- PASCAL edition! Questions? email 
 [masked]\, or leave a comment on the meetup page (though we tend to not 
 check that as often.)\n\nTags: meetup:event=xhvqfqyxmbdc\, meetup:group=
 pascalhackerspace\, open source\, python\, electronics\, microcontroller
 s\, technology\, network security\, mobile technology\, computer program
 ming\, open source hardware\, hackspaces\n\nImported from: http://calaga
 tor.org/events/1250474258
URL:https://www.meetup.com/pascalhackerspace/events/254627982/
SUMMARY:PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20180925T050330Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20181020T220000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20181020T180000
DTSTAMP;VALUE=DATE-TIME:20180925T050330Z
LAST-MODIFIED;VALUE=DATE-TIME:20180925T050330Z
UID:http://calagator.org/events/1250474324
DESCRIPTION:Hack2Learn is a monthly CTF (capture the flag) meetup hosted 
 at PASCAL in Portland\, OR. PASCAL is an organization of equal opportuni
 ty hackers\, and we will be introducing you to all the various types of 
 challenges that you might face at any level\, and at any time in the fie
 lds of information security and technology as a whole\, for fun or profi
 t.Hacker/Tech culture and community can sometimes be a bit (or a byte ^_
 ^) off-putting\, especially to those trying to figure out what exactly i
 t is\, what we are and what we do. During this workshop at PASCAL\, we w
 elcome n00bs with open arms! Never competed in a CTF challenge before? N
 ever even heard of CTFs? Do you have a strong desire to learn &amp\; tea
 ch alongside peers? GOOD!! You will fit right in at Hack2Learn!For the O
 ctober edition of Hack2Learn\, we will be focusing on web and binary cha
 llenges. First we will make sure everyone is set up with a virtual machi
 ne and the OS of their choice (though Kali is recommended\, specifically
  for the web challenges). For the binary challenges we will install Cutt
 er which is something of an intro to Radare2. You are encouraged to fami
 liarize yourself with Cutter and R2 prior to the workshop\; take a look-
 -&gt\; https://github.com/radareorg/cutter (note: downloading a VM and/o
 r installing a new OS is not necessary for using Cutter when working on 
 the binary challenges\, unless you're using Mac OS in which case you wil
 l need to spin up a VM for either Windows or Linux).Basic understanding 
 of at least one programming language and/or security concepts is helpful
 \, but not necessary. Honestly\, when we say all you need is a desire to
  learn\, we mean it!Cylon is setting up a wireless hacking station for O
 ctober H2L as well\, and will be offering some hands-on experience to an
 yone interested in the wonderful world of wireless hax!If you have a lap
 top\, bring it. We have a handful of loaners for those who need them\, a
 s well as a few desktop PCs for use at the hackerspace. So\, brush off y
 our social anxiety\, leave your impostor syndrome at the door\, and let 
 your inner hacker take a crack at capture the flag! Questions? Send an e
 mail to [masked]\, or leave a comment on the meetup page (though we tend
  to not check that as often.)\n\nTags: meetup:event=254929347\, meetup:g
 roup=pascalhackerspace\, open source\, python\, electronics\, microcontr
 ollers\, technology\, network security\, mobile technology\, computer pr
 ogramming\, open source hardware\, hackspaces\n\nImported from: http://c
 alagator.org/events/1250474324
URL:https://www.meetup.com/pascalhackerspace/events/254929347/
SUMMARY:PASCAL Hackerspace - Hacking+PASCAL=Hack2Learn
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190115T080639Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190117T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190117T183000
DTSTAMP;VALUE=DATE-TIME:20190115T080639Z
LAST-MODIFIED;VALUE=DATE-TIME:20190115T080639Z
UID:http://calagator.org/events/1250474841
DESCRIPTION:Hack2Learn: Hackers\, Assemble! (Part 2) Hack2Learn is a bi-m
 onthly CTF (capture the flag) meetup hosted at PASCAL in Portland\, OR. 
 PASCAL is an organization of equal opportunity hackers\, and we will be 
 introducing you to all the various types of challenges that you might fa
 ce at any level\, and at any time in the fields of information security 
 and technology as a whole\, for fun or profit.Hacker/Tech culture and co
 mmunity can sometimes be a bit (or a byte ^_^) off-putting\, especially 
 to those trying to figure out what exactly it is\, what we are and what 
 we do. During this meetup at PASCAL\, we welcome n00bs with open arms! N
 ever competed in a CTF challenge before? Never even heard of CTFs? Do yo
 u have a strong desire to learn &amp\; teach alongside peers? GOOD!! You
  will fit right in at Hack2Learn! For the next Hack2Learn workshop (yes\
 , we are finally getting this event rolling again!)\, we will be taking 
 a crack at Assembly-focused CTF (Capture The Flag) challenges: specifica
 lly\, the PICOCTF2018Assembly 0-2. MrDe4d will be walking everyone throu
 gh these challenges\, step by step (pun!) so that everyone in attendance
  will gain theoretical as well as applicable knowledge.Being able to gai
 n control of system memory is a powerful skill\, and is a gateway to und
 erstanding memory structure\, how data is accessed and processed\, how t
 he OS\, CPU and programs interface with one another and ultimately how t
 o pwn. A lot of people find Assembly intimidating..and while it may seem
  daunting and complicated at first glance but\, as with any programming 
 language\, a grasp of logic as well as dedication to learning are all th
 at are required. In addition to walking you through every step in each c
 hallenge\, a relatively quickintro to Assembly will be given\, hopefully
  demystifying it a bit for everyone. MrDe4d will cover basic syntax\, in
 structions and conditions. As we dive deeper into each aspect of the cha
 llenges\, we will continue to reiterate what has been covered with Assem
 bly- we expect questions to be frequent and recurring. It is absolutely 
 OK to ask the same thing more than once\; PASCAL Hack2Learn is a friendl
 y learning environment!H2L has two major goals: for everyone to capture 
 the flags\, and to learn to reverse engineer. This is not a workshop foc
 used on learning a tool\, rather it is designed to get attendees thinkin
 g logically\, critically &amp\; to get everyone accustomed to being unco
 mfortable and not knowing the answer.In order to participate\, attendees
  will need a computer running either Linux (distro of choice though for 
 this workshop Debian flavors are recommended) or Windows with a VM for L
 inux\, &amp\; an install of Cutter 1.7.2 (a Radare2 GUI). Note: Running 
 Linux is not absolutely necessary when using Cutter. Both Windows and Ma
 c are suitable and Cutter will run fine. Cutter still definitely has a l
 earning curve to it.. fortunately\, there is an excellent tutorial/intro
  on Megabeets.net! Questions? Email [masked] or get on the PASCAL Discor
 d and interact with other PDX hackers (ask for invite).\n\nTags: meetup:
 event=gthzpqyzcbwb\, meetup:group=pascalhackerspace\, open source\, pyth
 on\, electronics\, microcontrollers\, technology\, network security\, mo
 bile technology\, computer programming\, open source hardware\, hackspac
 es\n\nImported from: http://calagator.org/events/1250474841
URL:https://www.meetup.com/pascalhackerspace/events/257404995/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! Pt.2
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190115T080738Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190126T160000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190126T140000
DTSTAMP;VALUE=DATE-TIME:20190115T080738Z
LAST-MODIFIED;VALUE=DATE-TIME:20190115T080738Z
UID:http://calagator.org/events/1250474842
DESCRIPTION:That's right\, watch some guy stand up in front of a room of 
 people and go full commando! Whoa\, don't get too excited there. I will 
 be wearing clean...ish undergarments. By &quot\;going commando&quot\;\, 
 I am referring to conducting any and all of your everyday computing task
 s from the command line! Everything from being productive in an office e
 nvironment to posting the twitters and streamin' the youtubes! Why\, you
  ask? We are all hackers here aren't we? And what hacker doesn't want to
  look as cool in real life as we do in the movies? So come and enjoy all
  the typie-typie carpal tunnel goodness! Joe Cathell (that's Ca-THELL\, 
 not cat+hell..even though Joe is something of a crazy cat man) is an inf
 osec professional at the Washington University in St. Louis. When he's n
 ot defending our next generation of doctors from Russian hackers (true s
 tory\, ask him!)\, he can usually be found at the Arch Reactor Hackerspa
 ce. Joe is both a founding member of Arch Reactor and serving as the cur
 rent president of the board of directors. He is also a co-organizer of t
 he monthly STL2600 and DC314 meetup\, as well as a regular presenter. He
  likes blue raspberry Icees\, building robots and competitive butter scu
 lpting.\n\nTags: meetup:event=257551638\, meetup:group=pascalhackerspace
 \, open source\, python\, electronics\, microcontrollers\, technology\, 
 network security\, mobile technology\, computer programming\, open sourc
 e hardware\, hackspaces\n\nImported from: http://calagator.org/events/12
 50474842
URL:https://www.meetup.com/pascalhackerspace/events/257551638/
SUMMARY:PASCAL Hackerspace - Going Commando!
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190201T214908Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190206T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190206T183000
DTSTAMP;VALUE=DATE-TIME:20190201T214908Z
LAST-MODIFIED;VALUE=DATE-TIME:20190201T214908Z
UID:http://calagator.org/events/1250474971
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzdbjb\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250474971
URL:https://www.meetup.com/pascalhackerspace/events/258602518/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190221T212939Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190228T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190228T183000
DTSTAMP;VALUE=DATE-TIME:20190221T212939Z
LAST-MODIFIED;VALUE=DATE-TIME:20190221T212939Z
UID:http://calagator.org/events/1250475121
DESCRIPTION:Hack2Learn: Hackers\, Assemble! (Part 2) Hack2Learn is a bi-m
 onthly CTF (capture the flag) meetup hosted at PASCAL in Portland\, OR. 
 PASCAL is an organization of equal opportunity hackers\, and we will be 
 introducing you to all the various types of challenges that you might fa
 ce at any level\, and at any time in the fields of information security 
 and technology as a whole\, for fun or profit.Hacker/Tech culture and co
 mmunity can sometimes be a bit (or a byte ^_^) off-putting\, especially 
 to those trying to figure out what exactly it is\, what we are and what 
 we do. During this meetup at PASCAL\, we welcome n00bs with open arms! N
 ever competed in a CTF challenge before? Never even heard of CTFs? Do yo
 u have a strong desire to learn &amp\; teach alongside peers? GOOD!! You
  will fit right in at Hack2Learn! For the next few Hack2Learn workshops\
 , we will be taking a crack at Assembly-focused CTF (Capture The Flag) a
 nd reversing challenges. MrDe4d will be walking everyone through these c
 hallenges\, step by step (pun!) so that everyone in attendance will gain
  theoretical as well as applicable knowledge.Being able to gain control 
 of system memory is a powerful skill\, and is a gateway to understanding
  memory structure\, how data is accessed and processed\, how the OS\, CP
 U and programs interface with one another and ultimately how to pwn. A l
 ot of people find Assembly intimidating..and while it may seem daunting 
 and complicated at first glance but\, as with any programming language\,
  a grasp of logic as well as dedication to learning are all that are req
 uired. In addition to walking you through every step in each challenge\,
  a relatively quickintro to Assembly will be given\, hopefully demystify
 ing it a bit for everyone. MrDe4d will cover basic syntax\, instructions
  and conditions. As we dive deeper into each aspect of the challenges\, 
 we will continue to reiterate what has been covered with Assembly- we ex
 pect questions to be frequent and recurring. It is absolutely OK to ask 
 the same thing more than once\; PASCAL Hack2Learn is a friendly learning
  environment!H2L has two major goals: for everyone to capture the flags\
 , and to learn to reverse. This is not a workshop focused on learning a 
 tool (though we do use Cutter often)\, rather it is designed to get atte
 ndees thinking logically\, critically &amp\; to get everyone accustomed 
 to being uncomfortable and not knowing the answer.In order to participat
 e\, attendees will need a computer and an install of Cutter 1.7.4 (a Rad
 are2 GUI that can be used with Linux\, Windows or Mac). Note: Running Li
 nux is not absolutely necessary when using Cutter. Both Windows and Mac 
 are suitable and Cutter will run fine. Cutter still definitely has a lea
 rning curve to it.. the tutorial/intro on Megabeets.net is recommended. 
 Questions? Email [masked] or get on the PASCAL Discord and interact with
  other PDX hackers (ask for invite).\n\nTags: meetup:event=fvgzqqyzdblc\
 , meetup:group=pascalhackerspace\, open source\, python\, electronics\, 
 microcontrollers\, technology\, network security\, mobile technology\, c
 omputer programming\, open source hardware\, hackspaces\n\nImported from
 : http://calagator.org/events/1250475121
URL:https://www.meetup.com/pascalhackerspace/events/258815989/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! 
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190221T213022Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190306T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190306T183000
DTSTAMP;VALUE=DATE-TIME:20190221T213022Z
LAST-MODIFIED;VALUE=DATE-TIME:20190221T213022Z
UID:http://calagator.org/events/1250475122
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzfbjb\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250475122
URL:https://www.meetup.com/pascalhackerspace/events/258949556/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190315T214848Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190320T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190320T183000
DTSTAMP;VALUE=DATE-TIME:20190315T214848Z
LAST-MODIFIED;VALUE=DATE-TIME:20190315T214848Z
UID:http://calagator.org/events/1250475251
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzfbbc\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250475251
URL:https://www.meetup.com/pascalhackerspace/events/258949638/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190315T220555Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190328T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190328T183000
DTSTAMP;VALUE=DATE-TIME:20190315T220555Z
LAST-MODIFIED;VALUE=DATE-TIME:20190315T220555Z
UID:http://calagator.org/events/1250475253
DESCRIPTION:Hack2Learn is a bi-monthly CTF (capture the flag) meetup host
 ed at PASCAL in Portland\, OR. PASCAL is an organization of equal opport
 unity hackers\, and we will be introducing you to various types of rever
 se engineering and binary challenges that you might face at any level\, 
 and at any time in the fields of information security and technology as 
 a whole\, for fun or profit.Hacker/Tech culture and community can someti
 mes be a bit (or a byte ^_^) off-putting\, especially to those trying to
  figure out what exactly it is\, what we are and what we do. During this
  meetup at PASCAL\, we welcome n00bs with open arms! Never competed in a
  CTF challenge before? Never even heard of CTFs? Do you have a strong de
 sire to learn &amp\; teach alongside peers? GOOD!! You will fit right in
  at Hack2Learn! For the next several Hack2Learn workshops\, we will be t
 aking a crack at Assembly-focused CTF (Capture The Flag) and reversing c
 hallenges\, specifically microcorruption. MrDe4d will start by giving a 
 short presentation on a particular aspect of the theory behind ASM (last
  time we talked about ISRs in MSP430 MCUs). The goal of the presentation
  prior to the challenge is to (hopefully) help everyone in attendance to
  gain theoretical as well as practical knowledge.Being able to gain cont
 rol of system memory is a powerful skill\, and is a gateway to understan
 ding memory structure\, how data is accessed and processed\, how the OS\
 , CPU and programs interface with one another and ultimately how to pwn.
  Throughout the series we will cover basic syntax\, instructions\, condi
 tions\, and more! As we dive deeper into each aspect of the challenges\,
  we will continue to reiterate what has been covered with Assembly- we e
 xpect questions to be frequent and recurring. It is absolutely OK to ask
  the same thing more than once\; PASCAL Hack2Learn is a friendly learnin
 g environment!H2L has two major goals: for everyone to capture the flags
 \, and to learn to reverse. This is not a workshop focused on learning a
  tool (though we do use Cutter)\, rather it is designed to get attendees
  thinking logically\, critically &amp\; to get everyone accustomed to be
 ing uncomfortable and not knowing the answer.As we will be focusing on m
 icrocorruption CTF challenges for the next several workshops\, it is not
  necessary to have Cutter or any other debugger installed. Microcorrupti
 on has its own web based debugger that is very easy to learn and use! Qu
 estions? Email [masked] or get on the PASCAL Discord and interact with o
 ther PDX hackers (ask for invite).\n\nTags: meetup:event=fvgzqqyzfblc\, 
 meetup:group=pascalhackerspace\, open source\, python\, electronics\, mi
 crocontrollers\, technology\, network security\, mobile technology\, com
 puter programming\, open source hardware\, hackspaces\n\nImported from: 
 http://calagator.org/events/1250475253
URL:https://www.meetup.com/pascalhackerspace/events/258949662/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! 
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190315T220717Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190403T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190403T183000
DTSTAMP;VALUE=DATE-TIME:20190315T220717Z
LAST-MODIFIED;VALUE=DATE-TIME:20190315T220717Z
UID:http://calagator.org/events/1250475256
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzgbfb\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250475256
URL:https://www.meetup.com/pascalhackerspace/events/258949675/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190402T205515Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190411T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190411T183000
DTSTAMP;VALUE=DATE-TIME:20190402T205515Z
LAST-MODIFIED;VALUE=DATE-TIME:20190402T205515Z
UID:http://calagator.org/events/1250475371
DESCRIPTION:**NOTE** While we will continue to work on the microcorruptio
 n CTF for the next several Hack2Learn workshops\, the next meetup we are
  going to take a side quest and focus on a very special challenge involv
 ing hardware. It will be our first crack at embedded device security as 
 a group. For more details- come see PASCAL next Thursday! **END NOTE** H
 ack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL
  in Portland\, OR. PASCAL is an organization of equal opportunity hacker
 s\, and we will be introducing you to various types of reverse engineeri
 ng and binary challenges that you might face at any level\, and at any t
 ime in the fields of information security and technology as a whole\, fo
 r fun or profit.Hacker/Tech culture and community can sometimes be a bit
  (or a byte ^_^) off-putting\, especially to those trying to figure out 
 what exactly it is\, what we are and what we do. During this meetup at P
 ASCAL\, we welcome n00bs with open arms! Never competed in a CTF challen
 ge before? Never even heard of CTFs? Do you have a strong desire to lear
 n &amp\; teach alongside peers? GOOD!! You will fit right in at Hack2Lea
 rn! For the next several Hack2Learn workshops\, we will be taking a crac
 k at Assembly-focused CTF (Capture The Flag) and reversing challenges\, 
 specifically microcorruption. MrDe4d will start by giving a short presen
 tation on a particular aspect of the theory behind ASM (last time we tal
 ked about ISRs in MSP430 MCUs). The goal of the presentation prior to th
 e challenge is to (hopefully) help everyone in attendance to gain theore
 tical as well as practical knowledge.Being able to gain control of syste
 m memory is a powerful skill\, and is a gateway to understanding memory 
 structure\, how data is accessed and processed\, how the OS\, CPU and pr
 ograms interface with one another and ultimately how to pwn. Throughout 
 the series we will cover basic syntax\, instructions\, conditions\, and 
 more! As we dive deeper into each aspect of the challenges\, we will con
 tinue to reiterate what has been covered with Assembly- we expect questi
 ons to be frequent and recurring. It is absolutely OK to ask the same th
 ing more than once\; PASCAL Hack2Learn is a friendly learning environmen
 t!H2L has two major goals: for everyone to capture the flags\, and to le
 arn to reverse. This is not a workshop focused on learning a tool (thoug
 h we do use Cutter)\, rather it is designed to get attendees thinking lo
 gically\, critically &amp\; to get everyone accustomed to being uncomfor
 table and not knowing the answer.As we will be focusing on microcorrupti
 on CTF challenges for the next several workshops\, it is not necessary t
 o have Cutter or any other debugger installed. Microcorruption has its o
 wn web based debugger that is very easy to learn and use! Questions? Ema
 il [masked] or get on the PASCAL Discord and interact with other PDX hac
 kers (ask for invite).\n\nTags: meetup:event=fphntqyzgbpb\, meetup:group
 =pascalhackerspace\, open source\, python\, electronics\, microcontrolle
 rs\, technology\, network security\, mobile technology\, computer progra
 mming\, open source hardware\, hackspaces\n\nImported from: http://calag
 ator.org/events/1250475371
URL:https://www.meetup.com/pascalhackerspace/events/259686643/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! 
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190415T213933Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190417T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190417T183000
DTSTAMP;VALUE=DATE-TIME:20190415T213933Z
LAST-MODIFIED;VALUE=DATE-TIME:20190415T213933Z
UID:http://calagator.org/events/1250475435
DESCRIPTION:Some Teams are Red\, Others are Blue\, I Play Defense\, and S
 o Can You! An endpoint security primer in three (?-ish) parts.Part 1: Ma
 cOSPart 2: WindowsPart 3: Linux Come learn about the other side of the c
 ybersecurity equation: how to raise the bar for attackers trying to pwn 
 your endpoints. This talk series will focus on sane\, sensible\, and usa
 ble defaults\; what each operating system can bring to the table\; secur
 ity through proper configuration\; and small/medium scale distribution a
 nd management. Part 1: We'll start with a broad overview of securing end
 points\, the classes of attacks that might be encountered depending on y
 our use cases\, and what it means to be &quot\;secure.&quot\; Then\, we'
 ll talk about configuring macOS for reasonable security\, beginning with
  the hardware chain of trust\, moving through the bootloader and touchin
 g on what Apple's hw/sw integration allows for: Activation Locks\, MDM/D
 EP\, and Software Recovery. Moving up the stack\, we'll discuss the tier
 s of built-in macOS software security\, and if time permits\, several th
 ird party options to strengthen endpoint options. Part 2: Let's kick off
  with quick refresher on previous topics\, and then dive right in to Win
 dows endpoint security. Because of the diversity of hardware\, there wil
 l be less low-level focus this session\, but BitLocker\, TPM\, and OPAL 
 will be in the mix. Then\, learn why Secure Boot is not a conspiracy\, h
 ow Hyper-V is bae\, why Windows 10 is actually the best thing since... e
 arlier Windows 10 releases!\, what Group Policy can do for you\, and whi
 ch version of Windows is the minimum necessary for any kind of sanity. P
 art 3: In the stolen words of Steve Ballmer\, compartmentalize compartme
 ntalize compartmentalize! We'll talk about mitigating inevitable comprom
 ise\, and then move to Linux security. Coreboot\, Heads\, and refreshers
  from PC hardware kick us off\, then it's into the wilderness! We'll try
  and nail down some best practices for the wide and varied world of Linu
 x distros\, the security benefits of containers\, why Flatpak is awesome
 \, and a quick touch on grsecurity (aka &quot\;why we can't have nice th
 ings&quot\;). If there's time\, we'll even try to talk about the securit
 y benefits of other *nix's like OpenBSD &amp\; Qubes. Part 4: This is un
 written\, unplanned and unscheduled\, but part 4 (and 5\, and beyond!) c
 ould include topics like:- hypervisors! and why trying to share memory h
 as yet to be a good idea\;- how to do your best to secure them anyway\;-
  how and why you should deploy hardened and/or minimum viable configurat
 ions automatically (ansible\, JAMF\, AD/SCCM...) This is intended as a h
 igh-level overview to get a baseline for each of the three operating sys
 tems\; content will change and grow based on feedback and requests. Come
  help me evolve my endpoint security game\, and steer the course for fut
 ure events! This series is brought to you by PASCAL Hackerspace\, and pr
 esented by Magneto (the hacker\, not the mutant...ok well\, he *could* b
 e a mutant for all we know...)Magneto is: prototyping the future. trying
  to kill sleep. Security analysis and automation for profit. Other secur
 ity-related things for fun. Obtuse prose. Dream job: Starship Captain. T
 here's a reason for the nickname.\n\nTags: meetup:event=fbkbrqyzgbwb\, m
 eetup:group=pascalhackerspace\, open source\, python\, electronics\, mic
 rocontrollers\, technology\, network security\, mobile technology\, comp
 uter programming\, open source hardware\, hackspaces\n\nImported from: h
 ttp://calagator.org/events/1250475435
URL:https://www.meetup.com/pascalhackerspace/events/260427770/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190415T214127Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190425T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190425T183000
DTSTAMP;VALUE=DATE-TIME:20190415T214127Z
LAST-MODIFIED;VALUE=DATE-TIME:20190415T214127Z
UID:http://calagator.org/events/1250475440
DESCRIPTION:**NOTE** While we will continue to work on the microcorruptio
 n CTF for the next several Hack2Learn workshops\, the next meetup we are
  going to take a side quest and focus on a very special challenge involv
 ing hardware. It will be our first crack at embedded device security as 
 a group. For more details- come see PASCAL next Thursday! **END NOTE** H
 ack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL
  in Portland\, OR. PASCAL is an organization of equal opportunity hacker
 s\, and we will be introducing you to various types of reverse engineeri
 ng and binary challenges that you might face at any level\, and at any t
 ime in the fields of information security and technology as a whole\, fo
 r fun or profit.Hacker/Tech culture and community can sometimes be a bit
  (or a byte ^_^) off-putting\, especially to those trying to figure out 
 what exactly it is\, what we are and what we do. During this meetup at P
 ASCAL\, we welcome n00bs with open arms! Never competed in a CTF challen
 ge before? Never even heard of CTFs? Do you have a strong desire to lear
 n &amp\; teach alongside peers? GOOD!! You will fit right in at Hack2Lea
 rn! For the next several Hack2Learn workshops\, we will be taking a crac
 k at Assembly-focused CTF (Capture The Flag) and reversing challenges\, 
 specifically microcorruption. MrDe4d will start by giving a short presen
 tation on a particular aspect of the theory behind ASM (last time we tal
 ked about ISRs in MSP430 MCUs). The goal of the presentation prior to th
 e challenge is to (hopefully) help everyone in attendance to gain theore
 tical as well as practical knowledge.Being able to gain control of syste
 m memory is a powerful skill\, and is a gateway to understanding memory 
 structure\, how data is accessed and processed\, how the OS\, CPU and pr
 ograms interface with one another and ultimately how to pwn. Throughout 
 the series we will cover basic syntax\, instructions\, conditions\, and 
 more! As we dive deeper into each aspect of the challenges\, we will con
 tinue to reiterate what has been covered with Assembly- we expect questi
 ons to be frequent and recurring. It is absolutely OK to ask the same th
 ing more than once\; PASCAL Hack2Learn is a friendly learning environmen
 t!H2L has two major goals: for everyone to capture the flags\, and to le
 arn to reverse. This is not a workshop focused on learning a tool (thoug
 h we do use Cutter)\, rather it is designed to get attendees thinking lo
 gically\, critically &amp\; to get everyone accustomed to being uncomfor
 table and not knowing the answer.As we will be focusing on microcorrupti
 on CTF challenges for the next several workshops\, it is not necessary t
 o have Cutter or any other debugger installed. Microcorruption has its o
 wn web based debugger that is very easy to learn and use! Questions? Ema
 il [masked] or get on the PASCAL Discord and interact with other PDX hac
 kers (ask for invite).\n\nTags: meetup:event=lsrpvqyzgbhc\, meetup:group
 =pascalhackerspace\, open source\, python\, electronics\, microcontrolle
 rs\, technology\, network security\, mobile technology\, computer progra
 mming\, open source hardware\, hackspaces\n\nImported from: http://calag
 ator.org/events/1250475440
URL:https://www.meetup.com/pascalhackerspace/events/260429760/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! 
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190502T235738Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190509T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190509T183000
DTSTAMP;VALUE=DATE-TIME:20190502T235738Z
LAST-MODIFIED;VALUE=DATE-TIME:20190502T235738Z
UID:http://calagator.org/events/1250475570
DESCRIPTION:**NOTE** While we will continue to work on the microcorruptio
 n CTF for the next several Hack2Learn workshops\, the next meetup we are
  going to take a side quest and focus on a very special challenge involv
 ing hardware. It will be our first crack at embedded device security as 
 a group. For more details- come see PASCAL next Thursday! For the second
  part of this hardware challenge\, we will be taking an indepth look at 
 the device ROM and MCU. We will be using the MiniPro chip reader\, and a
 gain working with TTL converters. **END NOTE** Hack2Learn is a bi-monthl
 y CTF (capture the flag) meetup hosted at PASCAL in Portland\, OR. PASCA
 L is an organization of equal opportunity hackers\, and we will be intro
 ducing you to various types of reverse engineering and binary challenges
  that you might face at any level\, and at any time in the fields of inf
 ormation security and technology as a whole\, for fun or profit.Hacker/T
 ech culture and community can sometimes be a bit (or a byte ^_^) off-put
 ting\, especially to those trying to figure out what exactly it is\, wha
 t we are and what we do. During this meetup at PASCAL\, we welcome n00bs
  with open arms! Never competed in a CTF challenge before? Never even he
 ard of CTFs? Do you have a strong desire to learn &amp\; teach alongside
  peers? GOOD!! You will fit right in at Hack2Learn! For the next several
  Hack2Learn workshops\, we will be taking a crack at Assembly-focused CT
 F (Capture The Flag) and reversing challenges\, specifically microcorrup
 tion. MrDe4d will start by giving a short presentation on a particular a
 spect of the theory behind ASM (last time we talked about ISRs in MSP430
  MCUs). The goal of the presentation prior to the challenge is to (hopef
 ully) help everyone in attendance to gain theoretical as well as practic
 al knowledge.Being able to gain control of system memory is a powerful s
 kill\, and is a gateway to understanding memory structure\, how data is 
 accessed and processed\, how the OS\, CPU and programs interface with on
 e another and ultimately how to pwn. Throughout the series we will cover
  basic syntax\, instructions\, conditions\, and more! As we dive deeper 
 into each aspect of the challenges\, we will continue to reiterate what 
 has been covered with Assembly- we expect questions to be frequent and r
 ecurring. It is absolutely OK to ask the same thing more than once\; PAS
 CAL Hack2Learn is a friendly learning environment!H2L has two major goal
 s: for everyone to capture the flags\, and to learn to reverse. This is 
 not a workshop focused on learning a tool (though we do use Cutter)\, ra
 ther it is designed to get attendees thinking logically\, critically &am
 p\; to get everyone accustomed to being uncomfortable and not knowing th
 e answer.As we will be focusing on microcorruption CTF challenges for th
 e next several workshops\, it is not necessary to have Cutter or any oth
 er debugger installed. Microcorruption has its own web based debugger th
 at is very easy to learn and use! Questions? Email [masked] or get on th
 e PASCAL Discord and interact with other PDX hackers (ask for invite).\n
 \nTags: meetup:event=lsrpvqyzhbmb\, meetup:group=pascalhackerspace\, ope
 n source\, python\, electronics\, microcontrollers\, technology\, networ
 k security\, mobile technology\, computer programming\, open source hard
 ware\, hackspaces\n\nImported from: http://calagator.org/events/12504755
 70
URL:https://www.meetup.com/pascalhackerspace/events/260879398/
SUMMARY:PASCAL Hackerspace - Hack2Learn: Hackers\, Assemble! 
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
BEGIN:VEVENT
CREATED;VALUE=DATE-TIME:20190502T235944Z
DTEND;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190515T200000
DTSTART;TZID=America/Los_Angeles;VALUE=DATE-TIME:20190515T183000
DTSTAMP;VALUE=DATE-TIME:20190502T235944Z
LAST-MODIFIED;VALUE=DATE-TIME:20190502T235944Z
UID:http://calagator.org/events/1250475574
DESCRIPTION:Come learn about the other side of the cybersecurity equation
 : how to raise the bar for attackers trying to pwn your endpoints. This 
 talk series will focus on sane\, sensible\, and usable defaults\, securi
 ty through proper configuration\, and small/medium scale distribution an
 d management. ******** ******** ******** ******** ******** DefSec 0x05: 
 Ansible\, Part 1 Dive deep into the Dirac Sea...of security automation! 
 Let's talk about Ansible (the RedHat automation/configuration management
  tool\, not the scifi FTL machine). To quote a different introductory co
 urse\, &quot\;Ansible is an automation and configuration management tech
 nology used to provision\, deploy\, and manage compute infrastructure ac
 ross cloud\, virtual\, and physical environments.&quot\; This initial se
 ssion will focus on:- a high-level overview of what Ansible is- how it w
 orks- beginning to use Ansible via ad-hoc commands- reasoning + planning
  about tasks -&gt\; playbooks -&gt\; roles- how you might deploy it at s
 cale- and finally\, as time permits: hands on with playbooks! Part 2 of 
 this talk (coming soon!) will focus on a practical application of Ansibl
 e\, namely deploying the Ubuntu Linux CIS benchmark against multiple vir
 tual machines for hardening purposes. This series is brought to you by P
 ASCAL Hackerspace\, and presented by Magneto (the hacker\, not the mutan
 t. Probably.) He does security analysis and automation for profit\, and 
 systems thinking and other security-related things for fun. Uses obtuse 
 prose. Talks fast and loud. Dreams of eliminating sleep. Protoypes the f
 uture.\n\nTags: meetup:event=rsvmxqyzhbtb\, meetup:group=pascalhackerspa
 ce\, open source\, python\, electronics\, microcontrollers\, technology\
 , network security\, mobile technology\, computer programming\, open sou
 rce hardware\, hackspaces\n\nImported from: http://calagator.org/events/
 1250475574
URL:https://www.meetup.com/pascalhackerspace/events/260427910/
SUMMARY:PASCAL Hackerspace - Defensive Security: what can blue do for you
 ?
LOCATION:226 SE Madison St: 226 Southeast Madison Street\, Portland OR 97
 214 us
SEQUENCE:1
END:VEVENT
END:VCALENDAR
