<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>dc303</title>
    <description>Denver DEFCON group</description>
    <link>https://dc303-meetup.github.io/</link>
    <atom:link href="https://dc303-meetup.github.io/feed.xml" rel="self" type="application/rss+xml" />
    <pubDate>Sat, 09 May 2026 05:04:14 +0000</pubDate>
    <lastBuildDate>Sat, 09 May 2026 05:04:14 +0000</lastBuildDate>
    <generator>Jekyll v3.10.0</generator>
    
      <item>
        <title>Reversing Bad Brew</title>
        
          <author>_</author>
        
        <description>&lt;p&gt;Have you ever heard that Macs don’t get malware? Well that’s not true. Bad Brew was a click fix malware campaign that tricked users into downloading and running malware by imitating the homebrew package manager. I will compare an earlier and a more advanced malware sample that shows how the threat actors tactics changed over time&lt;/p&gt;
</description>
        <pubDate>Fri, 22 May 2026 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2026/05/22/reversing-bad-brew.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2026/05/22/reversing-bad-brew.html</guid>
      </item>
    
      <item>
        <title>Intro to CDX: A cybersecurity training range built for real learning</title>
        
          <author>Q</author>
        
        <description>&lt;p&gt;“What am I working on?”&lt;/p&gt;

&lt;p&gt;Building a flexible cybersecurity training range — one that can simulate
everything from simple flat networks to complex multi-site enterprises with
legacy systems, modern infrastructure, and all the messy realism in
between.&lt;/p&gt;

&lt;p&gt;Why?&lt;/p&gt;

&lt;p&gt;Because learning security requires a safe space to fail. Red
teamers need targets they can attack without consequences. Blue teamers need
environments where missed detections are lessons, not disasters. Students need
room to break things and understand why. CDX provides that space — fully
isolated, fully contained, and ready to reset as often as the learning
demands.&lt;/p&gt;

&lt;p&gt;What makes it different?&lt;/p&gt;

&lt;p&gt;The range isn’t just isolated networks in a vacuum. There’s
underlying infrastructure that makes it feel like operating within a larger
ecosystem — realistic enough to be worth a longer conversation if you’re
curious.&lt;/p&gt;

&lt;p&gt;Where is this headed?&lt;/p&gt;

&lt;p&gt;The project is open source and actively evolving. I’m building
exercises, refining automation, and exploring opportunities to support hands-on
training for security professionals, students, and teams who want something
more than a typical lab experience. Interested in training, contributing, or
learning more? I’d welcome the conversation.&lt;/p&gt;
</description>
        <pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2026/02/27/intro-to-cdx.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2026/02/27/intro-to-cdx.html</guid>
      </item>
    
      <item>
        <title>Car Hacking</title>
        
          <author>Specters</author>
        
        <description>&lt;p&gt;Finding vulnerabilities in automobiles… Some old ones and some ??&lt;/p&gt;
</description>
        <pubDate>Fri, 22 Aug 2025 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2025/08/22/car-hacking.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2025/08/22/car-hacking.html</guid>
      </item>
    
      <item>
        <title>Crash Course into the OWASP API Top 10</title>
        
          <author>Alan Shen</author>
        
        <description>&lt;p&gt;At this month’s meeting, Alan will preview his upcoming SnowFROC talk, Crash Course into the OWASP API Top 10. As a DC303 exclusive complimenting the talk, we will practice on the vulnerable applications Completely Ridiculous API (crAPI) and VAPI.&lt;/p&gt;

&lt;p&gt;To participate in the interactive part of the event, bring your own laptop with an intercepting proxy (Burp, ZAP, etc.) as well as an API testing tool like Postman. There will be several options for accessing the labs, including using API Sec University’s hosted environment, a local Proxmox lab network we will host in the space for the event, or setting up your own VMs on your laptop.&lt;/p&gt;

&lt;p&gt;Recommended Tools:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;https://portswigger.net/burp/communitydownload
https://www.zaproxy.org/
https://www.postman.com/
https://github.com/OWASP/crApi (or alternative to deploying a VM: http://crapi.apisec.ai/)
https://github.com/roottusk/vapi (or alternative to deploying a VM: http://vapi.apisec.ai/)
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Talk Abstract:&lt;/p&gt;

&lt;p&gt;Application Programming Interfaces (APIs) are the glue that allows independently evolving systems to communicate with each other, and are an important focus for security investment due to their privileged access to sensitive data and functionality. Recently, the OWASP API Top 10 has been updated for 2023, so join us as we introduce the OWASP API Security Project. We’ll cover what’s new in the 2023 API Top 10, as well as compare the differences with the previous 2019 version. For those interested in hands-on practice, we’ll also briefly introduce the OWASP crAPI (completely ridiculous API) Project which demonstrates common API vulnerabilities.&lt;/p&gt;
</description>
        <pubDate>Fri, 21 Feb 2025 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2025/02/21/crash-course-into-the-owasp-ap.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2025/02/21/crash-course-into-the-owasp-ap.html</guid>
      </item>
    
      <item>
        <title>A Web CTF For Everyone</title>
        
          <author>Mark Hoopes</author>
        
        <description>&lt;p&gt;At this month’s meeting we’ll spend some quality time with a truly insecure CRM application that has something for every level of web hacker. Entry level participants can explore a poorly designed authentication system, mid-level hackers will have plenty of opportunities to run SQL and JavaScript Injection attacks, and there is even a pathway to shell, but it will take some real dedication to get there. A walkthrough is available for those who need it so everyone should come away knowing a little more about how to attack (and defend) web applications. Bring your own laptop with an intercepting proxy (Burp, ZAP, etc.) installed to participate.&lt;/p&gt;
</description>
        <pubDate>Fri, 24 Jan 2025 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2025/01/24/a-web-ctf-for-everyone.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2025/01/24/a-web-ctf-for-everyone.html</guid>
      </item>
    
      <item>
        <title>COME LEARN ABOUT WIFI HACKING!</title>
        
          <author>Neko</author>
        
        <description>&lt;p&gt;COME LEARN ABOUT WIFI HACKING!
We’ll be going over wifi’s evolution over the years, learning about vulnerabilities, mitigations, the tooling available, what’s under the hood of most wifi routers, and how you can run your own audits and even defend wifi in an enterprise or home environment.&lt;/p&gt;

&lt;p&gt;INCLUDING PRACTICAL LABS!
We’ll be putting out a bunch of wifi access points, maybe even some vulnerable clients, and you’re going to be hacking them.&lt;/p&gt;

&lt;p&gt;HACK THE PLANET!&lt;/p&gt;
</description>
        <pubDate>Fri, 22 Nov 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/11/22/come-learn-about-wifi-hacking.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/11/22/come-learn-about-wifi-hacking.html</guid>
      </item>
    
      <item>
        <title>Cameron Hopkin</title>
        
        <description>&lt;p&gt;Examining the complex relationship between AI and Cybersecurity and Privacy. May do some exploration of the Claude family of AI models. Be ready for good discussion.&lt;/p&gt;
</description>
        <pubDate>Fri, 25 Oct 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/10/25/cameron-hopkin.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/10/25/cameron-hopkin.html</guid>
      </item>
    
      <item>
        <title>Programmable Cryptography: Actualizing Academic Innovation for Novel Technology</title>
        
          <author>Nuke</author>
        
        <description>&lt;p&gt;Seemly all of a sudden many theorized cryptographic systems are becoming practically usable. Programmable Cryptography is an exciting vision for novel applications using these new tools to empower privacy, verifiability, and much more. This talk will highlight some of these new tools and cover a few key use cases. We will invite discussions from the audience about how we might use these, helping drive adoption and innovation here in our local community and beyond! With any luck, we will come away with a few groups to kick-off a series of talks and workshops around this theme. Speaker bio: Nuke ðŸŒ„ is a developer relations advocate at https://risczero.com/ working to evangelize Verifiable Computation and is a huge fan of all things Programmable Cryptography &lt;em&gt;Application&lt;/em&gt;. He is a community Steward for https://cryptorado.org that in home for web3 innovators and open source tools to empower people to be self sovereign, focused on engineering coworking and community hackin’. Connect with him on Cryptorado’s Zulip (join at https://Cryptorado.org, or directly on signal&lt;/p&gt;
</description>
        <pubDate>Fri, 27 Sep 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/09/27/programmable-cryptography-actu.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/09/27/programmable-cryptography-actu.html</guid>
      </item>
    
      <item>
        <title>Hacker Summer Camp Recap and Highlights</title>
        
          <author>Mark Hoopes</author>
        
        <description>&lt;p&gt;Couldn’t make it to Hacker Summer Camp? Made it, but didn’t see every talk available? Join us for a group brain dump on the most interesting talks, research, and tools released at Blackhat, BSides Las Vegas, or DEF CON. Really anything recent and interesting is fair game. Please come with at least one item to share, even if it was just something you saw referenced and would like to know more about.&lt;/p&gt;
</description>
        <pubDate>Fri, 23 Aug 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/08/23/hacker-summer-camp-recap-and-h.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/08/23/hacker-summer-camp-recap-and-h.html</guid>
      </item>
    
      <item>
        <title>Hardware Hacking for the Young and Old</title>
        
          <author>Josh Datko</author>
        
        <description>&lt;p&gt;Have you agreed to a hardware pentest but don’t know where to start? Or perhaps you’re interested in hacking electronics for fun or profit. In any case, this talk will provide a gentle introduction to the hardware hacking scene. If you’re a software hacker, this session will empower you to start probing signals with confidence. For those already familiar with hardware hacking, we’ll delve into advanced attacks such as glitching and power analysis. We’ll even explore some fun analog hacking of cassettes. Join us for an informative and hands-on journey into the world of hardware hacking.&lt;/p&gt;
</description>
        <pubDate>Fri, 28 Jun 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/06/28/hardware-hacking-for-the-young.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/06/28/hardware-hacking-for-the-young.html</guid>
      </item>
    
      <item>
        <title>Open Source Industrial Control: Turning 2,800 Tons of Metal with Python and Flask</title>
        
          <author>Jacob Lapenna</author>
        
        <description>&lt;p&gt;(Preview of upcoming conference talk…)&lt;/p&gt;

&lt;p&gt;This is a story of how Python can fit into the physical world around us. It is a story of system design and product development. It is a tale of great breadth, covering distributed computing, custom printed circuits, electromagnetism, some of the largest hydropower generators in the world, and the software and hardware that brings this all together. This tale covers several years of research and development, culminating in a cyber physical system built on open-source software and easily attainable off-the-shelf products and components.&lt;/p&gt;

&lt;p&gt;We will also discuss performing security reviews and penetration tests of these types of systems.&lt;/p&gt;
</description>
        <pubDate>Fri, 26 Apr 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/04/26/open-source-industrial-control.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/04/26/open-source-industrial-control.html</guid>
      </item>
    
      <item>
        <title>HardenedBSD 2024 State of the Union: A Decade of Hardened Bits</title>
        
          <author>Shawn Webb</author>
        
        <description>&lt;p&gt;Abstract: The HardenedBSD Project is a “spork” of FreeBSD that aims to provide the wider BSD community with a clean-room reimplementation of the publicly-documented bits of the grsecurity patchset for Linux. The cofounders of the project started collaborating in 2013, and the project become official in 2014.&lt;/p&gt;

&lt;p&gt;HardenedBSD goes above and beyond its original goal by providing extra security enhancements, exploit mitigation strategies, and unique access into our infrastructure. We seek out ways to serve in global human rights endeavors, navigating the nexus between {cyber,info}sec and human rights.&lt;/p&gt;

&lt;p&gt;This presentation recaps the last decade of development and dives into where we aim to go in the next one, five, and ten year periods. We give tangible (yet sanitized) examples of the impact of our human rights focus.&lt;/p&gt;
</description>
        <pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2024/03/23/hardenedbsd-2024-state-of-the.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2024/03/23/hardenedbsd-2024-state-of-the.html</guid>
      </item>
    
      <item>
        <title>John Hoopes</title>
        
        <description>&lt;p&gt;Active Directory lab setup, exploitation, and walkthroughs. If you want to set your own up, cloud cost should be under 5 dollars for the evening, or people can use mine. (Sharing means you have to take turns.)&lt;/p&gt;
</description>
        <pubDate>Fri, 29 Dec 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/12/29/john-hoopes.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/12/29/john-hoopes.html</guid>
      </item>
    
      <item>
        <title>Austin Ballard</title>
        
        <description>&lt;p&gt;Compilation of the best hacks across AWS, Azure, and Kubernetes; showing off common security misconfigurations.&lt;/p&gt;
</description>
        <pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/12/01/austin-ballard.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/12/01/austin-ballard.html</guid>
      </item>
    
      <item>
        <title>CodeQL</title>
        
          <author>Kurt Burrell</author>
        
        <description>&lt;p&gt;Source code analysis is consistently regarded as one of the most effective strategies for uncovering vulnerabilities. However, manual reviews can be time consuming, not to mention difficult to scale for large applications or across application portfolios. Advancements in tooling have traditionally not kept pace with the industry’s needs, with security researchers often relying exclusively on non-security focused solutions such as Developer IDEs and grep.&lt;/p&gt;

&lt;p&gt;Enter: CodeQL. CodeQL is a semantic code scanning engine that introduces a rich, custom query language. This query language can augment manual source code review by highlighting areas of interest to focus on, or it can be used to model entire vulnerability classes and provide alerts when those models are detected in a code base.&lt;/p&gt;

&lt;p&gt;This workshop starts out with an introduction to CodeQL, how it works and what sets it a part from other solutions. It ramps up quickly to showcase how CodeQL can be applied to find vulnerabilities in real world applications. Tips and tricks, as well as strengths and weaknesses will also be covered. No experience is required.&lt;/p&gt;
</description>
        <pubDate>Fri, 22 Sep 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/09/22/codeql.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/09/22/codeql.html</guid>
      </item>
    
      <item>
        <title>Ruby on Rails for Pentesters</title>
        
        <description>&lt;p&gt;Ruby on Rails makes it easy to spin up a web application in minutes, but has proven to be reliable enough to run large company product offerings as well. Web Pentesters don’t technically need to know the platform behind the websites they’re testing, but when we do, we can sometimes find more interesting bugs more quickly. At this meeting we’ll start with the fundamentals by spinning up a trivial Rails app and then take a look at some vulnerabilities that often arise within Rails’s “sensible defaults”. Bring a laptop you’re willing to install Rails on to play along.&lt;/p&gt;
</description>
        <pubDate>Fri, 28 Jul 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/07/28/ruby-on-rails-for-pentesters.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/07/28/ruby-on-rails-for-pentesters.html</guid>
      </item>
    
      <item>
        <title>Purple Team 101</title>
        
        <description>&lt;p&gt;The how and why of a threat informed, offensive driven Defense&lt;/p&gt;
</description>
        <pubDate>Fri, 28 Apr 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/04/28/purple-team-101.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/04/28/purple-team-101.html</guid>
      </item>
    
      <item>
        <title>API Security Exercises with crAPI and vAPI</title>
        
        <description>&lt;p&gt;There is a recent wave of interest in API security within the broader security community, and APIs continue to be a promising source of security findings due to their ubiquity as the glue that connects disparate systems. With the goal of spending the latter half of the night on hands-on exercises, we will start with an introductory talk that will survey the resources that are available for learning API security, and discuss tips for what to look for when practicing with API-focused testing exercises. After the intro talk, let’s work through any questions regarding the exercises. If you would like to participate in the exercise half of the night, it is recommended in the interest of time to prepare before the meetup the tool/lab setup instructions under the “Lab Setup” chapter of API Sec University: https://www.apisecuniversity.com/courses/api-penetration-testing&lt;/p&gt;
</description>
        <pubDate>Fri, 24 Mar 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/03/24/api-security-exercises-with-cr.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/03/24/api-security-exercises-with-cr.html</guid>
      </item>
    
      <item>
        <title>Red Teaming: Windows and Linux Persistence Techniques</title>
        
        <description>&lt;p&gt;Red Teaming for a [redacted] college cybersecurity competition is a great opportunity to work on persistence techniques and develop some useful custom tools. We’ll go over the unique environment of this competition, how that applies to real world scenarios, and also share some tricks that can be played when you have permission to burn the environment to the ground.&lt;/p&gt;
</description>
        <pubDate>Fri, 24 Feb 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/02/24/red-teaming-windows-and-linux.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/02/24/red-teaming-windows-and-linux.html</guid>
      </item>
    
      <item>
        <title>We will cover the high-level concept of a fuzzer, then dig into the paper written by the authors of LibAFL, and then explore some code.</title>
        
          <author>Fuzzing with LibAFL</author>
        
        <description>&lt;p&gt;From the GitHub page: “LibAFL is a collection of reusable pieces of fuzzers, written in Rust. It is fast, multi-platform, no_std compatible, and scales over cores and machines.”&lt;/p&gt;

&lt;p&gt;If you want to learn and explore in advance, here are the main resources:&lt;/p&gt;

&lt;p&gt;GitHub is here: https://github.com/AFLplusplus/LibAFL&lt;/p&gt;

&lt;p&gt;Academic paper is here: https://www.s3.eurecom.fr/docs/ccs22_fioraldi.pdf&lt;/p&gt;
</description>
        <pubDate>Fri, 27 Jan 2023 00:00:00 +0000</pubDate>
        <link>https://dc303-meetup.github.io/2023/01/27/we-will-cover-the-high-level-c.html</link>
        <guid isPermaLink="true">https://dc303-meetup.github.io/2023/01/27/we-will-cover-the-high-level-c.html</guid>
      </item>
    
  </channel>
</rss>
