What we're about

SecTalks are informal, technical, no-bullshit* IT security discussions. It's about learning from others, talking about interesting things you're working on, and improving your security skills. We run a regular CTF.

From July 2018, we'll be running Berlin meetups in a couple of formats:

• Talk & CTF: a 15-25 minute presentation on an infosec topic, followed by a short 60-minute CTF. The winners write the next CTF (and show off their solutions).

• CTF-only: A longer 80-minute CTF. The winners write the next CTF (and show off their solutions).

SecTalks started in 2013 in Perth, Western Australia ( http://www.sectalks.org/perth/ ) and quickly spread to Sydney ( http://www.meetup.com/sectalks/ ), Melbourne ( http://www.meetup.com/SecTalks-Melbourne/ ), and Brisbane ( http://www.meetup.com/SecTalks-Brisbane/ ) - and now we're working to kick off our first international meetup in Berlin. We're a zero-cost operation, run by members: we present our talks in donated space, CTFs are written by the winners of the previous month, and we encourage everyone to speak occasionally on something cool they're working on.

Sound like fun? Hit Join above. New to infosec? Hit Join above! We're open to anyone who wants to improve and share their skills, and our CTF challenges range from straightforward (for example, an insecure web application ( https://github.com/sectalks/sectalks/blob/master/ctf-solutions/0x00/matt/solution.txt )) to ... very interesting. All our talks, CTFs and solutions are written up and published on GitHub ( https://github.com/sectalks/sectalks ).

Working on something interesting? Proposals for 15-25 minute presentations to get us started are extremely welcome. As in, I will shower you in gratitude and/or beer.

What on earth is a CTF? Each month, a member writes a Capture-the-Flag ( https://en.wikipedia.org/wiki/Capture_the_flag#Computer_security ) - a technical puzzle - for other members to solve. At the next meeting, the winners present their solution, and the first person to solve the CTF writes the challenge for the next month. Topics include things like binary reverse engineering, breaking simple crypto, or analysing network services. Generally, no prior knowledge is expected - the challenges are sometimes obscure, and you're expected to do a little bit of research to figure it out.

Want more information? The SecTalks computer-machines are connected to the interwebs and ready to serve you!

Email: berlin@sectalks.org
Twitter: @sectalks_ber ( https://twitter.com/Sectalks_BER )
Web: http://www.sectalks.org/berlin
GitHub: https://github.com/sectalks/sectalks (presentations, past CTFs and solutions)

* Being an Australian invention, we have a strict "no-bullshit" policy: no politics, vendor promotion or harassment. We love short, interesting, technical presentations and tricky CTFs.

Past events (4)

SecTalks Berlin 0x03

N26 Office

SecTalks Berlin 0x02

N26 Office

SecTalks Berlin 0x01

N26 Office

SecTalks Berlin 0x00

N26 Office

Photos (5)