<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>RPTFZ7@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-RPTFZ7</pentabarf:event-slug>
            <pentabarf:title>The Great Train Robbery - Hacking Like It&#x27;s 1855</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T093500</dtstart>
            <dtend>20251122T103500</dtend>
            <duration>1.00000</duration>
            <summary>The Great Train Robbery - Hacking Like It&#x27;s 1855</summary>
            <description>This talk is first and foremost an excuse for me to retell the story of The Great Train Robbery and to share my love for Michael Crichton’s book. But because I work in security, I could not stop myself from reading this book and asking myself: “How would this work?”, “Does this apply to today’s environments?” and most importantly, “I want to try this myself!”. 

As a result, this talk shares the story of The Great Train Robbery, enriched by my adventures and research into replicating multiple hacks. We will explore duplicating keys, cracking safes, physical recon and many more fun hacks that still today have a surprising resemblance to their Victorian era counterparts.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/RPTFZ7/</url>
            <location>Track 1</location>
            
            <attendee>Paul Zenker</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>BRVR3G@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-BRVR3G</pentabarf:event-slug>
            <pentabarf:title>The TPM and You - How (and why) to actually make use of your TPM</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T104000</dtstart>
            <dtend>20251122T112500</dtend>
            <duration>0.04500</duration>
            <summary>The TPM and You - How (and why) to actually make use of your TPM</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/BRVR3G/</url>
            <location>Track 1</location>
            
            <attendee>Mathias Tausig</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3QNUWE@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3QNUWE</pentabarf:event-slug>
            <pentabarf:title>Physical security assesments- what could possibly go wrong?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T113000</dtstart>
            <dtend>20251122T120000</dtend>
            <duration>0.03000</duration>
            <summary>Physical security assesments- what could possibly go wrong?</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/3QNUWE/</url>
            <location>Track 1</location>
            
            <attendee>Gabor Szivos</attendee>
            
            <attendee>Darius Beckert</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>9ZRUAL@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-9ZRUAL</pentabarf:event-slug>
            <pentabarf:title>How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T130500</dtstart>
            <dtend>20251122T140500</dtend>
            <duration>1.00000</duration>
            <summary>How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/9ZRUAL/</url>
            <location>Track 1</location>
            
            <attendee>Benjamin Floriani</attendee>
            
            <attendee>P&#x27;atrick Pong&lt;br&gt;atz</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>JFE9UX@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-JFE9UX</pentabarf:event-slug>
            <pentabarf:title>How to rob a bank using a payment terminal</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T141000</dtstart>
            <dtend>20251122T151000</dtend>
            <duration>1.00000</duration>
            <summary>How to rob a bank using a payment terminal</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/JFE9UX/</url>
            <location>Track 1</location>
            
            <attendee>Marcin Ochab</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>GZGG9U@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-GZGG9U</pentabarf:event-slug>
            <pentabarf:title>Sandworms in the Supply Chain: Surviving Shai-Hulud and Other Open-Source Nightmares</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T151500</dtstart>
            <dtend>20251122T160000</dtend>
            <duration>0.04500</duration>
            <summary>Sandworms in the Supply Chain: Surviving Shai-Hulud and Other Open-Source Nightmares</summary>
            <description>The open source supply chain is both our greatest strength and our weakest link. In the past year, npm has faced a series of high-impact malware campaigns, culminating in the discovery of Shai-Hulud—a worm that exploited package trust to propagate at scale. This session provides a deep dive into how these attacks unfold, why traditional defenses often fail, and what actionable steps teams can take to secure their dependencies. Attendees will leave with a clear understanding of current threat trends, detection techniques, and a practical roadmap for hardening their own pipelines, from package validation to runtime safeguards and incident response planning.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/GZGG9U/</url>
            <location>Track 1</location>
            
            <attendee>Ondrej Fitzek</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>EEEHHR@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-EEEHHR</pentabarf:event-slug>
            <pentabarf:title>z/OS for GenZ - Hack the Mainframe</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T160500</dtstart>
            <dtend>20251122T170500</dtend>
            <duration>1.00000</duration>
            <summary>z/OS for GenZ - Hack the Mainframe</summary>
            <description>For over 60 years, mainframes have been the backbone of mission-critical systems, yet they face significant challenges today. A growing skill gap is emerging as experienced system programmers retire, compounded by the high barrier to entry and domain-specific knowledge required. New talent is scarce due to limited and expensive learning resources, and knowledge sharing is often restricted.

Security testing is critical concern. There is a lack of objective-based penetration testing a knowledge deficit among security professionals adequately assess the vulnerabilities, leaving these essential systems exposed to potential threats.

This talk will address these issues, emphasizing the need for bridging the skill gap, promoting knowledge sharing, and enhancing security measures. The session will conclude with a live hacking demonstration, showcasing real-time vulnerabilities and underscoring the importance of robust security practices. Join us to explore the future of mainframe computing and its indispensable role in our digital infrastructure.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/EEEHHR/</url>
            <location>Track 1</location>
            
            <attendee>Jonathan Prince</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NELYW3@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NELYW3</pentabarf:event-slug>
            <pentabarf:title>From Vienna to Vegas: Lessons from DEF CON CTF with KuK Hofhackerei</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T171000</dtstart>
            <dtend>20251122T181000</dtend>
            <duration>1.00000</duration>
            <summary>From Vienna to Vegas: Lessons from DEF CON CTF with KuK Hofhackerei</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/NELYW3/</url>
            <location>Track 1</location>
            
            <attendee>Manuel Reinsperger</attendee>
            
            <attendee>Jonas Konrad</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ALANTS@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ALANTS</pentabarf:event-slug>
            <pentabarf:title>The OWASP Top 10 Looks Different From the Trenches</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T093500</dtstart>
            <dtend>20251122T100500</dtend>
            <duration>0.03000</duration>
            <summary>The OWASP Top 10 Looks Different From the Trenches</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/ALANTS/</url>
            <location>Track 2</location>
            
            <attendee>Fabian Funder</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HT3LTA@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HT3LTA</pentabarf:event-slug>
            <pentabarf:title>Hunting Bad Snakes</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T101000</dtstart>
            <dtend>20251122T104000</dtend>
            <duration>0.03000</duration>
            <summary>Hunting Bad Snakes</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/HT3LTA/</url>
            <location>Track 2</location>
            
            <attendee>Kamil Mańkowski</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>WCHVWJ@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-WCHVWJ</pentabarf:event-slug>
            <pentabarf:title>How to open nondestructive a lock with some handy tools?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T104500</dtstart>
            <dtend>20251122T111500</dtend>
            <duration>0.03000</duration>
            <summary>How to open nondestructive a lock with some handy tools?</summary>
            <description>First, we have also a workshop and some locks, for more fun. To visit the talk is not mandatory for the workshop.

OpenLocks is an austrian association for improving physical security since 2010.
We are lock pickers and do it for sports and hold yearly lock picking competitions.

In this talk, we talk about the locks, the pins, the tools and some preventions made by manufacturers.
So, after this talk, you will know, how the most locks work and how you could pick them.

There are also other methods to open a lock, but this could damage the lock and/or isn&#x27;t unsportsmanlike.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/WCHVWJ/</url>
            <location>Track 2</location>
            
            <attendee>deac</attendee>
            
            <attendee>Ben</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YX33SP@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YX33SP</pentabarf:event-slug>
            <pentabarf:title>StealthCup: Red Team Evasion Attempts vs. Modern EDR/IDS/SIEM in a Multi-Stage IT/OT CTF</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T112000</dtstart>
            <dtend>20251122T115000</dtend>
            <duration>0.03000</duration>
            <summary>StealthCup: Red Team Evasion Attempts vs. Modern EDR/IDS/SIEM in a Multi-Stage IT/OT CTF</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/YX33SP/</url>
            <location>Track 2</location>
            
            <attendee>Manuel Kern</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>V8FYY7@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-V8FYY7</pentabarf:event-slug>
            <pentabarf:title>how malicious code pwned a secure coding CTF</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T134000</dtstart>
            <dtend>20251122T135500</dtend>
            <duration>0.01500</duration>
            <summary>how malicious code pwned a secure coding CTF</summary>
            <description>The Amazon AppSec CTF 2025 featured three secure coding challenges where 30 finalists were tasked with patching vulnerabilities like path traversal and command injections in different systems. A backend validation system would test submitted fixes and award flags for properly secured code. This presentation will walk through the Capture The Flag structure, demonstrate the specific exploitation techniques which were used, and discuss the broader implications. We&#x27;ll examine why validation systems in security competitions need the same scrutiny as the challenges themselves, explore the ethical boundaries of exploiting competition infrastructure, and reveal why Amazon paused the finals mid-competition (oops).</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/V8FYY7/</url>
            <location>Track 2</location>
            
            <attendee>Markus</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FYN3TX@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FYN3TX</pentabarf:event-slug>
            <pentabarf:title>Self Pwning</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T141000</dtstart>
            <dtend>20251122T151000</dtend>
            <duration>1.00000</duration>
            <summary>Self Pwning</summary>
            <description>Mental health challenges are increasingly recognized as critical issues in the cybersecurity community, yet they are often overlooked and under-discussed. This session explores imposter syndrome, burnout, stress, and anxiety, examining how these challenges manifest in high-pressure technical environments and affect both personal well-being and professional performance. Attendees will gain practical coping strategies and tools for managing each challenge, along with actionable techniques to build resilience, maintain balance, and reduce stress. The session also highlights resources, support systems, and ongoing strategies to foster a healthier work environment. Through real-world examples, research insights, and evidence-based approaches, participants will leave equipped to cultivate sustainable careers and thrive in cybersecurity.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/FYN3TX/</url>
            <location>Track 2</location>
            
            <attendee>Sam Macdonald</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VCQATE@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VCQATE</pentabarf:event-slug>
            <pentabarf:title>How I built a C2 framework from scratch and why you should(n&#x27;t) do the same.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T151500</dtstart>
            <dtend>20251122T160000</dtend>
            <duration>0.04500</duration>
            <summary>How I built a C2 framework from scratch and why you should(n&#x27;t) do the same.</summary>
            <description>C2 frameworks are highly complex pieces of software, consisting of multiple architectural layers, components and features. At the bare minimum, modern C2s have at least a client and server component, as well as some sort of agent/implant/payload. The server handles connections and requests from agents that are executed on target systems, allowing operators to - as the name suggests - *command* and *control* them remotely from a client user interface. 

In addition to front- and backend development, data management and a lot of difficult design decisions, C2 developers are required to balance functionality with operational security and configurability, so that their programs can be easily customized or extended to slip past security controls or the watchful eyes of blue teamers. 

In this talk, I want to take you on a journey of how I turned the idea and vision of building a custom command and control framework into reality. I will cover the up’s and down’s, the successes and failures, the reality checks and the rewarding lessons learned that come with such a project, all with the goal of answering the question: Should or should you not try to build your own C2? 

Agenda: 
- What are Command &amp; Control frameworks? How do they work?
- Design choices: Language, Architecture, Communication
- Framework features and how to implement them (Beaconing, C2 profiles, Sleep obfuscation, Modules, Evasion and more)
- Risk, Reward &amp; Lessons Learned: Why should(n’t) you build a C2?

Conquest: https://github.com/jakobfriedl/conquest/</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Short Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/VCQATE/</url>
            <location>Track 2</location>
            
            <attendee>Jakob Friedl</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>3URMQS@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-3URMQS</pentabarf:event-slug>
            <pentabarf:title>Living Under the Land on Linux</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T160500</dtstart>
            <dtend>20251122T170500</dtend>
            <duration>1.00000</duration>
            <summary>Living Under the Land on Linux</summary>
            <description>In a sense, Linux ops are just a series of commands sent to some shell we&#x27;ve got calling back to us.  That all just boils down to running a bunch of programs (except when it doesn&#x27;t), but under the hood we&#x27;re just running a bunch of code to do things which turns out to be just a convenient way to make system calls which themselves are just a handy way to ask the Linux kernel to do things for us.

Unjust application of layers of abstraction has, in one Red Teamer&#x27;s opinion, made Linux seem way more complicated than necessary.  In this talk we&#x27;ll distill Linux operations down to a handful of system calls and a bit of syntax to make them happen and build on that to give ourselves flexibility to operate with ease in the somewhat unpredictable modern landscape of minimal containers, hardened distributions, and so on.

The slides can be found at https://t.co/hiZ2Ddj5c0</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/3URMQS/</url>
            <location>Track 2</location>
            
            <attendee>Stuart McMurray</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>TQTFXR@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-TQTFXR</pentabarf:event-slug>
            <pentabarf:title>Hacking with AI, how to have some fun</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T093500</dtstart>
            <dtend>20251122T113500</dtend>
            <duration>2.00000</duration>
            <summary>Hacking with AI, how to have some fun</summary>
            <description>In this workshop, we will go through the general notions of using LLMs for automation, with a focus on offensive security tasks.

Given current scientific evaluations and building from personal experience, we will walk through several techniques, starting from simple text completion and building up to a full multi-agent framework (including information on what will still not work with the current iterations of those).

In the end, the goal is to understand what something like this can be used for, how you can build it yourself and why we don&#x27;t need to fear the terminator coming just now.

Please bring:
- Laptop with Python installed and an internet connection (venue has WIFI)

Optional but good:
- Your own API key for an LLM Provider (recommendation is to use OpenRouter, especially since there are some free models available via that)
- A problem you want to apply the experiments to (the more difficult the problem, the less help I will be able to give you when something goes wrong, but you can directly apply your newfound skills)</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/TQTFXR/</url>
            <location>Workshop Room</location>
            
            <attendee>Manuel Reinsperger</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>E9KQW8@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-E9KQW8</pentabarf:event-slug>
            <pentabarf:title>I want to open a lock.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T130500</dtstart>
            <dtend>20251122T150500</dtend>
            <duration>2.00000</duration>
            <summary>I want to open a lock.</summary>
            <description>OpenLocks is an Austrian association for improving physical security since 2010.
We are lock pickers and do it for sports and hold yearly lock picking competitions.

We will explain how to rake and pick locks with our provided tools.
If you have already tools, of course you can use them.
And if you have already a lock, which you cannot open, you can ask us about it.  But we cannot guaranty, that we are able to open it or could explain, how to open it.

There are also other methods to open a lock, but this could damage the lock and/or isn&#x27;t unsportsmanlike.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/E9KQW8/</url>
            <location>Workshop Room</location>
            
            <attendee>deac</attendee>
            
            <attendee>Ben</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7SNWWX@@cfp.bsidesvienna.at</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7SNWWX</pentabarf:event-slug>
            <pentabarf:title>Essential Security Configurations and How To Exploit Them</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20251122T151000</dtstart>
            <dtend>20251122T171000</dtend>
            <duration>2.00000</duration>
            <summary>Essential Security Configurations and How To Exploit Them</summary>
            <description>Attendees need to bring their own laptop (BYOL) with a modern internet browser in order to participate in this interactive workshop. No prior knowledge is required.

In this hands-on workshop, participants will dive into fundamental security configurations that form the backbone of enterprise defenses. We will cover key topics such as SMB signing, client hardening, and the secure use of common network protocols. Attendees will not only gain a solid understanding of why these settings matter, but also see how misconfigurations can be abused in real-world attack scenarios.

In our dedicated lab environment, we will work together to apply and test effective remediations, ensuring that every highlighted vulnerability is paired with a practical and reliable solution. By the end of the session, attendees will walk away with skills to both recognize and securely configure these essential controls in their own environments.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Workshop</category>
            <url>https://cfp.bsidesvienna.at/bsidesvienna-0x7e9-2025/talk/7SNWWX/</url>
            <location>Workshop Room</location>
            
            <attendee>Benjamin Floriani</attendee>
            
            <attendee>P&#x27;atrick Pong&lt;br&gt;atz</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
