Are you sure about losing your spot?
Don't forget that if you change your rsvp status, you may need to join event waiting list.
![[0x5F7375625F41414141] - The Meet](https://media.kommunity.com/communities/0xoposec/events/0x5F7375625F41414141-60b4d35a/73481/0x5f7375625f41414141-the.jpeg?p=event-640)
[0x0x5F7375625F41414141] - The Meet
Spring's in the air, and so is the smell of digital upheaval! We're kicking off our fourth meetup, packed with insights ripped from the national headlines and the global grid. Get ready for a double dose of intel that cuts through the noise.
First, our OSINT geek, Pedro Vieira (@Shell5), is back to unraveling the political scandal that rocked the nation. He'll show you how public data laid bare the government's downfall—because, let's face it, secrets are overrated.
Then, Pedro Vilaça (@fG), the resident reverse engineering wizard, dives deep into the guts of macOS cracks from the infamous TNT warez group. He's leaving no byte unturned, exposing their architecture, sneaky obfuscation, and anti-debugging tricks. This is your chance to get a front-row seat to the cyber arms race and a reality check that there's no such thing as a free lunch.
Gear up for a session that'll sharpen your OSINT skills and reverse-engineering chops. Don't be the one hearing about it later and spring into action.
Just a friendly reminder: this is an in-person event. Before RSVPing, please double-check that you can attend and be there in person. Good logistics rely on it!
In the meantime, you can join our Slack chat (https://bit.ly/3XbyGQu) to discuss all kinds of hackish stuff and, of course, interact with other members.
Don't miss out. Your FOMO will be justified.
[Goals]
Learn something new, get to know other g33ks, and, the most important thing, have fun.
[Agenda]
- "Private Business, Public Fallout: How OSINT Took Down Portugal's Government" (PT/EN) by Pedro Vieira (@Shell5)
- "Maybe Cracking the Crackers - Is Cyber war real?" (PT/EN) by Pedro Vilaça (@fG)
[Challenge]
This remote administration system is fresh out of the dev oven. Features are still being tested, but security? Bulletproof.
And no prophecy will let you in without the key! Do your best. Can you get the flag?
URL: http://madlabs.pw
⚠️ Note: Ping (@)jmoraissec or (@)SiMpS0N with the flag and play fair! Avoid making destructive attacks—keeping the system intact ensures everyone enjoys the challenge.
