Monthly Meetings
Deep dives into cybersecurity concepts through the red teaming lens
Upcoming Meetings
Will be announced soon. See more on our LinkedIn page!
Past Meetings

CI/CD Security: From Build to Deployment
Comprehensive workshop on CI/CD pipeline security featuring a hands-on CI/CD CTF. Covered artifact management vulnerabilities, build system exploitation, and deployment pipeline attacks.

Hotel Key Card Hacking: Wiegand & OSDP Protocols
Specialized workshop on Wiegand and OSDP protocols used in hotel key card systems and access control. Hands-on exploration of card cloning techniques, security vulnerabilities, and physical access bypass methods.

Breaking into Red Teaming: Career Pathways Panel
Interactive panel interview with experienced red teamers discussing common career backgrounds, transition paths into offensive security, and practical advice for breaking into the red teaming field.

Azure Exploitation: Hunting Misconfigurations
Comprehensive workshop on Microsoft Azure security assessment, focusing on common misconfigurations and exploitation techniques specific to Azure environments and services.

Container Services Exploitation in the Cloud
Advanced workshop on exploiting container services, building upon our AWS foundation from previous sessions. Covers container escape techniques, Kubernetes security, and cloud-native exploitation methods.

Physical Security Systems: Tools, Tactics & War Stories
In-depth presentation covering modern physical security systems, specialized tools and tactics used in physical penetration testing, accompanied by real-world war stories from the field.

Red Team vs Blue Team: Attack/Defend CTF
We put on an attack/defend CTF and taught players common strategies for both red and blue teams. Participants learned to attack infrastructure while simultaneously defending their own systems.

Resume Review for Red Team Professionals
In Jan 2025, we did a resume review, helping Red Teamers get a new job in the new year.

CI/CD Pipeline Security: Attacking the Software Supply Chain
Comprehensive workshop on CI/CD security vulnerabilities, covering pipeline injection attacks, secrets management failures, and supply chain compromise techniques with hands-on demonstrations.

Cloud Security Fundamentals: AWS Attack Scenarios
Introduction to cloud security focusing on AWS attack vectors, misconfigurations, and privilege escalation techniques commonly found in cloud environments.

Buffer Overflow Exploitation: From Theory to Practice
Hands-on workshop covering stack-based buffer overflows, shellcode development, and exploitation techniques using classic vulnerable applications and modern bypass methods.

SAML Exploitation: Breaking Single Sign-On
Deep dive into SAML vulnerabilities and exploitation techniques. We'll explore signature wrapping, XML signature exclusion, and replay attacks while building our own custom CTF challenges.

Command Line Mastery with OverTheWire Bandit
Comprehensive command line fundamentals workshop walking through most of OverTheWire's Bandit course, teaching essential Linux skills and terminal navigation for security professionals.

Source Code Analysis Fundamentals
Deep dive into static code analysis techniques, covering taint analysis methodology, identifying sources and sinks, and tracing data flow to discover security vulnerabilities.

USB Rubber Ducky: Hardware Hacking for Shell Access
Hands-on workshop exploring how USB Rubber Duckies can be weaponized to gain shell access on various operating systems through keystroke injection attacks.

Wifi Attacks: From Cracking to Evil Twins
Comprehensive workshop on wireless security attacks including WPA/WPA2 cracking, evil twin setup, and captive portal bypasses using modern tools and techniques.

Mobile App Security: Android Pentesting Fundamentals
Introduction to Android application security testing, covering static and dynamic analysis, root detection bypasses, and common mobile vulnerabilities using OWASP Mobile Top 10.

Red Team vs Blue Team: Attack/Defend CTF
Hands-on attack/defend CTF competition where participants learned both offensive and defensive strategies, working in teams to attack infrastructure while defending their own systems.

Resume Review for Security Professionals
In Feb, we did a resume review, helping hackers get new jobs in the new year.

Resume Review for Security Professionals
In Jan, 2024, we did a resume review, helping hackers get new jobs in the new year.

RTA Inaugural Meetup & Analogue CTF
Our first in-person meetup at Stoup Brewing in Ballard! Meet and greet with the community followed by a surprise hands-on Analogue CTF competition.
Meeting Format
3 hour social and technical meetings with in-depth exploration and live demonstrations
Most of our meetings include a lab where participants can practice techniques in a safe environment.