We want to establish a regular gathering (Stammtisch) for cyber security topics in Cologne Ehrenfeld. The meetings will focus on offensive security, like penetration testing, red teaming and hacking tools/gadgets, but also on everything security-related, in which the majority of attendees will be interested in the long term. We pursue the idea of open source knowledge and create these meetups every two months. One or two presenters and about an hour of technical talks with pizza and drinks at the end to offer a proper socializing platform in the Spike Reply facility.
If you have ideas or want to give a talk on a specific topic, feel free to contact the group administrator on Meetup!
The meetups so far took place in:
Oskar-Jäger-Straße 173 K4
50825 Köln
Slides will always be shared via GitHub
Organization and detailed information on the meetings are available at Meetup!
The meeting is free of charges. Our room, drinks and pizza are sponsored by Spike Reply GmbH, but we keep the meetup free from advertising ;)
This was our first event. It took place on 22. May 2019 19:00h, doors open from 18:30h. The talk was about FRIDA a Dynamic Binary Instrumentation framework that allows for runtime binary manipulation on e.g. iOS and Android applications.
Our second meeting took place on 17. July 2019 19:00h, doors open from 18:30h. Daniel Sauder gave a talk about AVET, told us about its purpose and showed some nifty tricks on how to work with it.
This was our third edition of root.cologne! It took place on 5. December 2019 19:00h, doors open from 18:30h. Sebastian Kriesten from @-yet, educated us on the inner workings of Microsofts Antimalware Scan Interface short AMSI, how to bypass it even today and gave some recommendations for future detection and prevention of such attack methods.
This was the fourth edition of root.cologne! It took place on 5. March 2020 18:00h, doors open from 17:30h. I was pleased to have Nanne Baars, the project lead of the OWASP project WebGoat at root.cologne. He will will give us a hands on with this project to learn about common JavaEE vulnerabilites and how to exploit them. In order to attend to this workshop it is recommended to bring a laptop and download the software from github (https://github.com/WebGoat/WebGoat) and make sure to have Java installed.
Corona hit hard... I will consider to reboot the whole project somewhere in the future. Keep you posted!