<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CTWTSF@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CTWTSF</pentabarf:event-slug>
            <pentabarf:title>Rethinking Human Vulnerabilities in Cybersecurity</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T103000</dtstart>
            <dtend>20250329T110000</dtend>
            <duration>0.03000</duration>
            <summary>Rethinking Human Vulnerabilities in Cybersecurity</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/CTWTSF/</url>
            <location>P1</location>
            
            <attendee>David  Modic</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SUXXTA@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SUXXTA</pentabarf:event-slug>
            <pentabarf:title>Breaking the Box: A Practical Guide to Container Security</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T111000</dtstart>
            <dtend>20250329T121000</dtend>
            <duration>1.00000</duration>
            <summary>Breaking the Box: A Practical Guide to Container Security</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lecture</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/SUXXTA/</url>
            <location>P1</location>
            
            <attendee>Aleš Brelih</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NVREUD@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NVREUD</pentabarf:event-slug>
            <pentabarf:title>Dissecting HijackLoader: From Fake CAPTCHA to NTFS Transacted Hollowing</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T124000</dtstart>
            <dtend>20250329T131000</dtend>
            <duration>0.03000</duration>
            <summary>Dissecting HijackLoader: From Fake CAPTCHA to NTFS Transacted Hollowing</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/NVREUD/</url>
            <location>P1</location>
            
            <attendee>Urban Vidergar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YJHKTC@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YJHKTC</pentabarf:event-slug>
            <pentabarf:title>Reproducible builds and why they matter</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T132000</dtstart>
            <dtend>20250329T135000</dtend>
            <duration>0.03000</duration>
            <summary>Reproducible builds and why they matter</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/YJHKTC/</url>
            <location>P1</location>
            
            <attendee>Foobar</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>DTSCJJ@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-DTSCJJ</pentabarf:event-slug>
            <pentabarf:title>Rootkits - how deep the rabbit hole is</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T140000</dtstart>
            <dtend>20250329T150000</dtend>
            <duration>1.00000</duration>
            <summary>Rootkits - how deep the rabbit hole is</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lecture</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/DTSCJJ/</url>
            <location>P1</location>
            
            <attendee>Matej Kovačič</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FLCGTB@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FLCGTB</pentabarf:event-slug>
            <pentabarf:title>PXE Hacking 101: From Network Boot to Credential Extraction</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T170000</dtstart>
            <dtend>20250329T173000</dtend>
            <duration>0.03000</duration>
            <summary>PXE Hacking 101: From Network Boot to Credential Extraction</summary>
            <description>PXE booting is a powerful tool used in enterprise environments for system deployment and recovery, but it is often overlooked as a security risk. In this 30-minute seminar, we will cover:

- Understanding PXE: How network booting works and why it is commonly used.
- How PXE Can Be Exploited: Common vulnerabilities, including unauthenticated booting and insecure TFTP transfers.
- Extracting Passwords: Demonstrating how attackers can intercept PXE boot files, retrieve hashed passwords, and escalate privileges.
- Live Demo: A step-by-step exploitation of a misconfigured PXE server.
- Mitigation Strategies: How to secure PXE environments against unauthorized access.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/FLCGTB/</url>
            <location>P1</location>
            
            <attendee>Žan Urbančič</attendee>
            
            <attendee>Danijela Šantak</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EKBRRD@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EKBRRD</pentabarf:event-slug>
            <pentabarf:title>Recon OSINT</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T174000</dtstart>
            <dtend>20250329T184000</dtend>
            <duration>1.00000</duration>
            <summary>Recon OSINT</summary>
            <description>Lecture Content:
✅ What is OSINT and OPSEC? – Introduction to OSINT methodology and the importance of Operational Security (OPSEC) for Protecting the Investigator in OSINT Research.
✅ Fundamentals: Where and How to Start? – First steps in OSINT, covering both technical and procedural aspects (NDA, scope definition, legal considerations, double checking information).
✅ Passive vs. Active OSINT – Understanding the differences and when to apply each approach.

Key OSINT Research Areas:
✅ Business &amp; Technical OSINT – Passive analysis of publicly available business data:
    -  Investigation of IP addresses, domains, and company infrastructure.
    -  Searching for email addresses, job postings, and business intelligence.
✅ Human OSINT (HUMINT) &amp; Social Media OSINT (SOCMINT) – Gathering information on individuals:
   -  Analyzing publicly available social media profiles and user activity.
✅ Geo OSINT (GEOINT) – Geolocation data analysis and its applications in investigations.

OSINT Tools Covered (depends on time):
✅ OSINT Framework, DNSDumpster, Shodan, Censys, Domain Dossier, Hunter.io, Dehashed, Wappalyzer, BuiltWith, Google Dorking, Google Maps, Google Reverse Image Search, Yandex Images, PimEyes, Maltego, theHarvester,.

Practical Demonstration:
- Geo OSINT – How to determine the geolocation of a picture using Image OSINT with help of google maps.
-  Social Media OSINT – Basic search methods for gathering publicly available information.

Who Should Attend?
The lecture is suitable for anyone interested in this field, as well as those who want to improve the protection of their publicly accessible data.

Time Considerations:
Given that the lecture is limited to one hour, the focus will be on key concepts, practical examples, and essential tools, providing a solid foundation for further exploration.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Lecture</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/EKBRRD/</url>
            <location>P1</location>
            
            <attendee>Marko Ličina</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>UATVVB@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-UATVVB</pentabarf:event-slug>
            <pentabarf:title>How to (mostly) fail at making money with security</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T191000</dtstart>
            <dtend>20250329T194000</dtend>
            <duration>0.03000</duration>
            <summary>How to (mostly) fail at making money with security</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/UATVVB/</url>
            <location>P1</location>
            
            <attendee>Neyts Zupan</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3J33ZA@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3J33ZA</pentabarf:event-slug>
            <pentabarf:title>Automating HTTPS for Tor Onion Sites</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T195000</dtstart>
            <dtend>20250329T202000</dtend>
            <duration>0.03000</duration>
            <summary>Automating HTTPS for Tor Onion Sites</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/3J33ZA/</url>
            <location>P1</location>
            
            <attendee>Q Misell</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CT88QF@@cfp.dragonsec.si</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CT88QF</pentabarf:event-slug>
            <pentabarf:title>Intro to CTF</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250329T203000</dtstart>
            <dtend>20250329T210000</dtend>
            <duration>0.03000</duration>
            <summary>Intro to CTF</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.dragonsec.si/dctf25/talk/CT88QF/</url>
            <location>P1</location>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
