$ cat about.txt
DC207 is a DEF CON group focused on community, education, mentoring and bringing the hacker and InfoSec community in Maine together. We meet the second Thursday of every month in the Old Port at 7 Custom House St, 3rd floor at 6PM. It is a gathering that will feature presentations, workshops, CTFs, and anything else in which the community is interested. The group is community-driven, and allows its members to be active so they can learn or teach about a subject they are passionate about. DC207 also supports the already-existing security-related and technology-focused groups, and we encourage members of all groups to collaborate and share knowledge. We are strong together!
The mission of the DC207 group is to advance knowledge and educate anyone interested in science, technology, and other areas of information security through project collaborations, group gatherings, and group activities that will best serve our community and the world.
$ cat contact.txt
E-mail us at firstname.lastname@example.org
$ cat meetings.txt
title: Let’s not wait for the heat death of the universe before we secure our APIs
date of meeting: December 13th 2018
description: Horrors of API security revealed! Talk by Ben Hamilton.
Meeting two! DC207 is back in action with a hot security topic, pizza, and prizes on December 13th. Ben Hamilton will be presenting a talk focused on vulnrabilities in APIs. He’ll explore how APIs are an often overlooked by development teams.
Pizza from OTTO, softdrinks on site. The CTF event requires a write-up, submit yours @ email@example.com for a chance for to win a Pen-testing Raspberry Pi. See you there!
title: DC207 Resurrected: OSINT - What we already know
date of meeting: November 08 2018
description: DC207 Resurrected. Talk by Benjamin Allen, OSINT - What we already know.
Our first meeting will take place on November 8th, 2018. We’ll have a 20 minute talk about open source intellegence titled: “OSINT - What we already know”. We’ll explore open source intellegence and how effective it can be in gain access to resources. You’ll learn what you need to do to profile yourself, and your own company.
We’ll also take a little time to talk though the solution of the CTF challenge posted below. We’ll talk about how we want to run our meetings, CTF challenges, and have a drink or two afterwards.
$ cat CTF.txt
- CTF - December Edition - Second CTF event, really fun one located on Vulnhub. Your goal - get root. Once you break the box and write up how you got access. E-mail your document to firstname.lastname@example.org so you can be entered into December's raffle! We'll giving away a pentesting raspberry pi at the December meeting.
- CTF - November Edition - Your first goal is to abuse the services on the machine to gain unauthorised shell access. Your ultimate goal is to read a text file in the root user's home directory root/flag.txt). There are several ways to break into the box, what will you find? We'll discuss this CTF at our first meeting.