What we're about
Upcoming events (5+)
PASCAL Hackerspace is proud to announce a new presentation series in which an experienced security researcher, Malcolm, will be guiding us through the intricacies of network forensics! The class will begin with a basic overview of what networks are; from conversations and snail mail to signal processing and radio operations (including ham radio!), ultimately leading into computer networks. We will review each aspect that comprises a network (paying special attention to protocols), how they function and eventually moving on to how they can be exploited! The focus will predominantly be on TCP/IP and the OSI model computer networks. Layers, abstraction and encapsulation will be covered as well as the various physical and data link layers of each model. Each of the TCP/IP and OSI layers will be explained in detail, with some extra special attention being paid to the Transport Layer and its packets! The end of the presentation will culminate in a hands-on workshop. Attendees will get assistance with installing Wireshark (if you do not already have it)- then proceed with live Network Forensics Seek and Pwn: capture, investigate, analyze! Malcolm is a threat researcher with a major networking and security company, and has been doing networking for way too long. He wants to help other hackers learn the wonderful and weird world of packets, and all the terrible things you can do with them.
Hack2Learn is a bi-monthly CTF (capture the flag) meetup hosted at PASCAL in Portland, OR. PASCAL is an organization of equal opportunity hackers, and we will be introducing you to various types of reverse engineering and binary challenges that you might face at any level, and at any time in the fields of information security and technology as a whole, for fun or profit. Hacker/Tech culture and community can sometimes be a bit (or a byte ^_^) off-putting, especially to those trying to figure out what exactly it is, what we are and what we do. During this meetup at PASCAL, we welcome n00bs with open arms! Never competed in a CTF challenge before? Never even heard of CTFs? Do you have a strong desire to learn & teach alongside peers? GOOD!! You will fit right in at Hack2Learn! For the next several Hack2Learn workshops, we will be taking a crack at Assembly-focused CTF (Capture The Flag) and reversing challenges, specifically microcorruption. MrDe4d will start by giving a short presentation on a particular aspect of the theory behind ASM (last time we talked about ISRs in MSP430 MCUs). The goal of the presentation prior to the challenge is to (hopefully) help everyone in attendance to gain theoretical as well as practical knowledge. Being able to gain control of system memory is a powerful skill, and is a gateway to understanding memory structure, how data is accessed and processed, how the OS, CPU and programs interface with one another and ultimately how to pwn. Throughout the series we will cover basic syntax, instructions, conditions, and more! As we dive deeper into each aspect of the challenges, we will continue to reiterate what has been covered with Assembly- we expect questions to be frequent and recurring. It is absolutely OK to ask the same thing more than once; PASCAL Hack2Learn is a friendly learning environment! H2L has two major goals: for everyone to capture the flags, and to learn to reverse. This is not a workshop focused on learning a tool (though we do use Cutter), rather it is designed to get attendees thinking logically, critically & to get everyone accustomed to being uncomfortable and not knowing the answer. As we will be focusing on microcorruption CTF challenges for the next several workshops, it is not necessary to have Cutter or any other debugger installed. Microcorruption has its own web based debugger that is very easy to learn and use! Questions? Email [masked] or get on the PASCAL Discord and interact with other PDX hackers (ask for invite).
This Saturday at PASCAL we are offering a Hacker Symposium of sorts, featuring a few handy tools of the trade as well as two major frameworks often used in developing exploits and attacking systems or networks. We will be surveying several of the tools that are part of Kali, and easy to install on any Debian derived distro. It seems many folks, sometimes even the professionals already hip deep in the field of tech, are unaware of the power their packages wield! The wild hacker kidz at PASCAL are going to show you how to get started with packaged/pre-loaded tools like Burp Suite, Binwalk, Wireshark, Kismet and will also provide you with an overview of the Metasploit and Volatility frameworks. Come take your first step with Reverse Engineering at PASCAL using Binwalk! Excuse yourself and set up a proxy with Burp Suite! Breath deep and sniff packets with Kismet! Enjoy these puns and more, in person with Cylon and the rest of the misfit hackers of PDX! We will set aside time to answer questions, and hold demonstrations of each utility discussed. This is all about what YOU want to learn!! Questions? please email Cylon--> [masked]. PASCAL also has a Discord server as means of communication regarding upcoming events, news in infosec and memes (inquire within). If you RSVP and are no longer able to make it, please do take the time to change your RSVP so that someone else may attend, even if it is only an hour before! Thanks!