User Tools

Site Tools



Cyber Buffet

This track is CLOSED, but you can register to join the “wait list.” Attendees on the “wait list” will placed for now in their alternate, second-choice track and then notified if and when space opens up in their “wait list” track.

Learn many cybersecurity topics in a fun, capture-the-flag competition format. Each participant works at their own pace. The techniques will be demonstrated with complete step-by-step instructions to lead beginners through the easy challenges. There are also harder challenges for more experienced participants.

We will cover these topics:

  • Mon - Securing Web Apps
  • Tue - Violent Python 3
  • Wed - Windows Internals
  • Thu - Incident Response and the ATT&CK Matrix
  • Fri - Golang & COBOL

We will help participants, as needed, to ensure that everyone learns new techniques.

Participants need a computer that can run virtual machines, or a credit card and a few dollars to rent cloud servers. We will use Linux and Windows systems. All the tools we will use are freely available, and all the training materials will remain available to everyone after the workshop ends.


Familiarity with networking and security at the level of Network+ and Security+, and with programming (any language) would be helpful but are not required.

At-Home Computer Requirements
Participants need a computer that can run virtual machines, or a credit card and a few dollars to rent cloud servers.

All Summer Working Connections attendees will need a strong and dependable internet connection. A web camera is preferred to help with class interactions.


Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, HOPE, BSidesSF, BSidesLV, RSA, and many conferences and colleges. Learn more here.

Track Objectives
At the completion of this track, the participants will be able to…

  • Perform attacks on modern Web apps and stop them
  • Explain how Windows software runs at the binary level
  • Understand attribution of attackers and their Tools, Techniques, and Procedures


Monday, Securing Web Apps

We will use BurpSuite and the Web Security Academy to perform attacks on Web applications including SQL injection, brute force, cross-site scripting, cross-site request forgery, and many other modern methods.

Tuesday, Violent Python 3

Even if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. We build tools that perform port scanning, brute-force attacks, crack password hashes, and XOR encryption. Python is among the top three programming languages in the world, for good reason: it's the easiest language to use for general purposes.

Wednesday, Windows Internals

Explore the structure of Windows executable files and the operating system itself, to better understand programs, services, malware, and defenses. Projects include: cheating at games, building malicious DLL libraries, stealing passwords from the API, building a keylogger, and debugging a driver. Tools used include FLARE-VM, pestudio, Visual Studio, OllyDbg, IDA Pro, Ghidra, and WinDbg.

Thursday, Incident Response and the ATT&CK Matrix

Use modern techniques to detect, analyze and respond to intrusions. In this workshop, you will build vulnerable systems in the cloud, attack them, and respond to the attacks. Tools used include Splunk, GRR, Zeek, and the ATT&CK matrix.

Friday, Golang & COBOL

Make attack tools in Google's Golang. We'll peform port scans, HTTP requests, brute-force logins, crack password hashes, and perform encryption using XOR and AES.

The world runs on COBOL, but few people remember it: “an elegant weapon for a more civilized age.” Learn COBOL programming! Challenges include building Web requests, brute-forcing logins, number theory, classical encryption, and RSA. We will use Open COBOL on Linux servers, and a real IBM i Server mainframe. Party like it's 1959! COBOL will never die!

Please note the schedule is subject to change or be modified based on the needs of the track participants.

cyber.txt · Last modified: 2021/04/13 14:02 by admin