<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.why2025.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=War3nd0z</id>
	<title>WHY2025 wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.why2025.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=War3nd0z"/>
	<link rel="alternate" type="text/html" href="https://wiki.why2025.org/Special:Contributions/War3nd0z"/>
	<updated>2026-04-22T05:40:05Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.12</generator>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19181</id>
		<title>Session:KubeVenom</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19181"/>
		<updated>2025-08-09T00:52:01Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Session&lt;br /&gt;
|Has session tag=kubernetes, cloud, hacking, pipelines, Azure, Go, C2&lt;br /&gt;
|Has signup=No&lt;br /&gt;
|Is for kids=No&lt;br /&gt;
|Is for age range=16+&lt;br /&gt;
|Has description=Talk about building a C2 framework for attacking kubernetes, pipelines and cloud environments&lt;br /&gt;
|Has website=https://wiki.why2025.org/Village:Green_Ninjas&lt;br /&gt;
|Has session type=Talk&lt;br /&gt;
|Has session keywords=software&lt;br /&gt;
|Processed by village=Green Ninjas&lt;br /&gt;
|Is organized by=War3nd0z&lt;br /&gt;
|Held in language=en - English, nl - Dutch&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has start time=2025-08-11 16:00:00&lt;br /&gt;
|Has duration=30&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19180</id>
		<title>Session:KubeVenom</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19180"/>
		<updated>2025-08-09T00:49:17Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Session&lt;br /&gt;
|Has session tag=kubernetes, cloud, hacking, pipelines, Azure, Go, C2&lt;br /&gt;
|Has signup=No&lt;br /&gt;
|Is for kids=No&lt;br /&gt;
|Is for age range=16+&lt;br /&gt;
|Has description=Talk about building a C2 framework for attacking kubernetes, pipelines and cloud environments&lt;br /&gt;
|Has website=https://wiki.why2025.org/Village:Green_Ninjas&lt;br /&gt;
|Has session type=Talk&lt;br /&gt;
|Has session keywords=software&lt;br /&gt;
|Processed by village=Green Ninjas&lt;br /&gt;
|Held in language=en - English, nl - Dutch&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has start time=2025-08-11 16:00:00&lt;br /&gt;
|Has duration=30&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19172</id>
		<title>Session:KubeVenom</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19172"/>
		<updated>2025-08-08T22:32:50Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Session&lt;br /&gt;
|Has session tag=kubernetes, cloud, hacking, pipelines, Azure, Go, C2&lt;br /&gt;
|Has signup=No&lt;br /&gt;
|Is for kids=No&lt;br /&gt;
|Is for age range=16+&lt;br /&gt;
|Has description=Talk about building a tool for hacking kubernetes, pipelines and cloud environments&lt;br /&gt;
|Has website=https://wiki.why2025.org/Village:Green_Ninjas&lt;br /&gt;
|Has session type=Talk&lt;br /&gt;
|Has session keywords=software&lt;br /&gt;
|Processed by village=Green Ninjas&lt;br /&gt;
|Held in language=en - English, nl - Dutch&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has start time=2025-08-11 16:00:00&lt;br /&gt;
|Has duration=30&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19167</id>
		<title>Session:KubeVenom</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Session:KubeVenom&amp;diff=19167"/>
		<updated>2025-08-08T21:22:56Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Session&lt;br /&gt;
|Has session tag=kubernetes, cloud, hacking, pipelines, Azure, Go, C2&lt;br /&gt;
|Has signup=No&lt;br /&gt;
|Is for kids=No&lt;br /&gt;
|Is for age range=16+&lt;br /&gt;
|Has description=Talk about building a tool for hacking kubernetes and other cloud environments&lt;br /&gt;
|Has website=https://wiki.why2025.org/Village:Green_Ninjas&lt;br /&gt;
|Has session type=Talk&lt;br /&gt;
|Has session keywords=software&lt;br /&gt;
|Processed by village=Green Ninjas&lt;br /&gt;
|Held in language=en - English, nl - Dutch&lt;br /&gt;
}}&lt;br /&gt;
{{Event&lt;br /&gt;
|Has start time=2025-08-11 16:00:00&lt;br /&gt;
|Has duration=30&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=18963</id>
		<title>Village:Green Ninjas</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=18963"/>
		<updated>2025-08-08T09:51:29Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Village&lt;br /&gt;
|Has name=Green Ninjas&lt;br /&gt;
|Has contact=Viv&lt;br /&gt;
|Has description=This village is related to the sponsor(tent) of Deloitte where we host cool talks and presentations.&lt;br /&gt;
|Village is open to newcomers=No&lt;br /&gt;
|Provides session location=Yes&lt;br /&gt;
|Location=52.69241, 4.7484&lt;br /&gt;
|Has orga contact=vvallee@deloitte.nl&lt;br /&gt;
|On site orga contact=Viviane, +31 (0) 6 155 855 08&lt;br /&gt;
|Village frab=Not necessarily&lt;br /&gt;
|Village content space=We have an internal list of talks we would like to do in our tent.&lt;br /&gt;
|Village citizen count=25-30&lt;br /&gt;
|Village Needs power=Large Village (32A CEE 400V)&lt;br /&gt;
|Village size needed=250&lt;br /&gt;
|Village hacktents num=4&lt;br /&gt;
|Village brings big stuff=No&lt;br /&gt;
|Village Special Vehicle=No&lt;br /&gt;
|Village planning notes=Platinium Sponsor Tent + tents of people attending the event.&lt;br /&gt;
We will self-host talks in our tent.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=Welcome to the Green Ninjas Village!=&lt;br /&gt;
&lt;br /&gt;
Hi everybody! Welcome to the Green Ninjas Village. We are a group of techies and geeks that enjoy all things cybersecurity. From hardware hacking to incident response, we have someone who has been involved in it and we want to share our knowledge and experiences, so feel free to drop by. Below you will find the abridged version of the talks, with more details below.  &lt;br /&gt;
&lt;br /&gt;
=Presentations Schedule=&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Village Presentations&lt;br /&gt;
! Speaker(s) !! Name of the Talk !! Day !! Time &lt;br /&gt;
|-&lt;br /&gt;
| Santiago Quintero || Rust tutorial and Port Scanner  || Saturday || 11-12 &lt;br /&gt;
|-&lt;br /&gt;
| Firoz Hari || Forget all your previous instructions || Saturday || 13-14    &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Reversing Engineering (Pwn Workshop 1) || Saturday || 14-16  &lt;br /&gt;
|-&lt;br /&gt;
| Jilles Groenendijk || Hollywood-Style Smartlock Attack || Saturday || 16-17  &lt;br /&gt;
|-&lt;br /&gt;
| Mauricio Cano || Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)  || Sunday || 11-12    &lt;br /&gt;
|-&lt;br /&gt;
| Rayan Brouwer &amp;amp; Christiaan Erwich || How to (not) ace a Cyber Incident Response case || Sunday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Binary Exploitation (Pwn Workshop 2) || Sunday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Jelle Vergeer || How to Become a Red Teamer  || Sunday || 16-17 &lt;br /&gt;
|-&lt;br /&gt;
| Sergio Becerril || Hacky Hunting!  || Monday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Mick Cox || Fuzz Testing in Go (for Funz and Profit) || Monday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Ralph van den Hoff || Building a cloud focused C2 in Go (KubeV3n0m)  || Monday || 16-17 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Presentations Details=&lt;br /&gt;
Below we have a detailed breakdown of the presentations day by day.&lt;br /&gt;
==Saturday==&lt;br /&gt;
===Rust tutorial and Port Scanner===&lt;br /&gt;
====Santiago Quintero====&lt;br /&gt;
The Rust programming language allows us to build not only fast and memory-efficient programs, but also memory-safe and thread-safe. In this workshop we will get familiar with Rust&#039;s type system and ownership model, along with tools like rustc, cargo, rustfmt, and the RLS.&lt;br /&gt;
&lt;br /&gt;
===Forget All Your Instructions!===&lt;br /&gt;
====Firoz Hari====&lt;br /&gt;
This talk is an intro to some techniques used when performing prompt injection. It also goes over briefly the OWASP Top 10 LLM as well as some of useful resources when pen-testing an LLM implementation. There is a hands on lab to try out the different techniques learnt.&lt;br /&gt;
&lt;br /&gt;
===Reversing Engineering (Pwn Workshop 1)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
Do you live with the following questions? What is assembly? How do you read assembly? What is a decompiler? How do you use radare and Ghidra? Join the workshop with interactive challenges.&lt;br /&gt;
 &lt;br /&gt;
===Hollywood-Style Smartlock Attack===&lt;br /&gt;
====Jilles Groenendijk====&lt;br /&gt;
In this lecture Jilles wil introduce you to his world of Hardware Hacking.&lt;br /&gt;
&lt;br /&gt;
Inspired by Hollywood blockbusters such as the Wargames he will take you on his journey to see if he is able to recreate such spectacular attacks.&lt;br /&gt;
&lt;br /&gt;
And while doing so, he will explain the steps required to do hardware hacking and what tools are required.&lt;br /&gt;
&lt;br /&gt;
The big question is: Are these attacks even possible?&lt;br /&gt;
&lt;br /&gt;
Attend this session and you will find out!&lt;br /&gt;
&lt;br /&gt;
==Sunday==&lt;br /&gt;
===Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)===&lt;br /&gt;
====Mauricio Cano====&lt;br /&gt;
&lt;br /&gt;
Have you ever wondered how Kubernetes attacks path look like in actual practice? A lot of of presentations warn about the risks of privileged containers, read-write filesystems, mounting drives and storages, but in a lot of cases they never really show you, in a terminal, how those attacks look like. In this presentation we will explain a bit of the Kubernetes architecture and we will show attack paths look like from the perspective of an actual hacker finding a vulnerable container in the cluster and what you can do about it.&lt;br /&gt;
&lt;br /&gt;
===How to (not) ace a Cyber Incident Response case===&lt;br /&gt;
====Rayan Brouwer &amp;amp; Christiaan Erwich====&lt;br /&gt;
In this presentation we will solve a real Cyber Incident Response (CIR) case together with the audience. We will present a CIR scenario, give tips and tricks on the way of working and involve the audience interactively to solve the case. Will the audience come up with the same response as the CIR team? The presentation is intended for both a technical and non-technical audience. &lt;br /&gt;
&lt;br /&gt;
===Binary Exploitation (Pwn Workshop 2)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
From crash to control: how can we exploit buffer overflows? Are your hands itching to do something with your newfound reverse engineering skills? Join the workshop with interactive challenges!&lt;br /&gt;
&lt;br /&gt;
===How to Become a Red Teamer===&lt;br /&gt;
====Jelle Vergeer====&lt;br /&gt;
In this presentation, Jelle, a seasoned red teamer, will be talking about his experiences and the provide a bit of context and stories of how he became one and what his role is in the team.&lt;br /&gt;
&lt;br /&gt;
==Monday==&lt;br /&gt;
===Hacky Hunting!===&lt;br /&gt;
====Sergio Becerril====&lt;br /&gt;
Hacking is all about making the most of what you have. In this talk I will be discussing a few select topics on how we hack our way into threat hunting.&lt;br /&gt;
&lt;br /&gt;
===Fuzz Testing in Go (for Funz and Profit)===&lt;br /&gt;
====Mick Cox====&lt;br /&gt;
Fuzz Testing is an often overlooked method automated security, reliability and performance testing in development teams (and offensive teams?). Since version 1.18 (2022), native fuzzing capability was added to the Go standard library. In this tutorial we will take a look at what is provided in the fuzzing library, how to use it and how to apply it to fund bugs (or vulnerabilities) in your favorite apps!  - Basic knowledge of the Go programming language will be assumed. To participate, please bring a computer with the Go environment installed.&lt;br /&gt;
 &lt;br /&gt;
=== Building a cloud focused C2 in Go (KubeV3n0m)===&lt;br /&gt;
====Ralph van den Hoff====&lt;br /&gt;
KubeV3n0m is a passion project born out of different offensive security projects related to Kubernetes and Cloud. The presentation is a small update on the current state of the project and goals, as well as to showcase some of its functionalities.&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=18962</id>
		<title>Village:Green Ninjas</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=18962"/>
		<updated>2025-08-08T09:50:26Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Village&lt;br /&gt;
|Has name=Green Ninjas&lt;br /&gt;
|Has contact=Viv&lt;br /&gt;
|Has description=This village is related to the sponsor(tent) of Deloitte where we host cool talks and presentations.&lt;br /&gt;
|Village is open to newcomers=No&lt;br /&gt;
|Provides session location=Maybe&lt;br /&gt;
|Location=52.69241, 4.7484&lt;br /&gt;
|Has orga contact=vvallee@deloitte.nl&lt;br /&gt;
|On site orga contact=Viviane, +31 (0) 6 155 855 08&lt;br /&gt;
|Village frab=Not necessarily&lt;br /&gt;
|Village content space=We have an internal list of talks we would like to do in our tent.&lt;br /&gt;
|Village citizen count=25-30&lt;br /&gt;
|Village Needs power=Large Village (32A CEE 400V)&lt;br /&gt;
|Village size needed=250&lt;br /&gt;
|Village hacktents num=4&lt;br /&gt;
|Village brings big stuff=No&lt;br /&gt;
|Village Special Vehicle=No&lt;br /&gt;
|Village planning notes=Platinium Sponsor Tent + tents of people attending the event.&lt;br /&gt;
We will self-host talks in our tent.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=Welcome to the Green Ninjas Village!=&lt;br /&gt;
&lt;br /&gt;
Hi everybody! Welcome to the Green Ninjas Village. We are a group of techies and geeks that enjoy all things cybersecurity. From hardware hacking to incident response, we have someone who has been involved in it and we want to share our knowledge and experiences, so feel free to drop by. Below you will find the abridged version of the talks, with more details below.  &lt;br /&gt;
&lt;br /&gt;
=Presentations Schedule=&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Village Presentations&lt;br /&gt;
! Speaker(s) !! Name of the Talk !! Day !! Time &lt;br /&gt;
|-&lt;br /&gt;
| Santiago Quintero || Rust tutorial and Port Scanner  || Saturday || 11-12 &lt;br /&gt;
|-&lt;br /&gt;
| Firoz Hari || Forget all your previous instructions || Saturday || 13-14    &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Reversing Engineering (Pwn Workshop 1) || Saturday || 14-16  &lt;br /&gt;
|-&lt;br /&gt;
| Jilles Groenendijk || Hollywood-Style Smartlock Attack || Saturday || 16-17  &lt;br /&gt;
|-&lt;br /&gt;
| Mauricio Cano || Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)  || Sunday || 11-12    &lt;br /&gt;
|-&lt;br /&gt;
| Rayan Brouwer &amp;amp; Christiaan Erwich || How to (not) ace a Cyber Incident Response case || Sunday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Binary Exploitation (Pwn Workshop 2) || Sunday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Jelle Vergeer || How to Become a Red Teamer  || Sunday || 16-17 &lt;br /&gt;
|-&lt;br /&gt;
| Sergio Becerril || Hacky Hunting!  || Monday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Mick Cox || Fuzz Testing in Go (for Funz and Profit) || Monday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Ralph van den Hoff || Building a cloud focused C2 in Go (KubeV3n0m)  || Monday || 16-17 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Presentations Details=&lt;br /&gt;
Below we have a detailed breakdown of the presentations day by day.&lt;br /&gt;
==Saturday==&lt;br /&gt;
===Rust tutorial and Port Scanner===&lt;br /&gt;
====Santiago Quintero====&lt;br /&gt;
The Rust programming language allows us to build not only fast and memory-efficient programs, but also memory-safe and thread-safe. In this workshop we will get familiar with Rust&#039;s type system and ownership model, along with tools like rustc, cargo, rustfmt, and the RLS.&lt;br /&gt;
&lt;br /&gt;
===Forget All Your Instructions!===&lt;br /&gt;
====Firoz Hari====&lt;br /&gt;
This talk is an intro to some techniques used when performing prompt injection. It also goes over briefly the OWASP Top 10 LLM as well as some of useful resources when pen-testing an LLM implementation. There is a hands on lab to try out the different techniques learnt.&lt;br /&gt;
&lt;br /&gt;
===Reversing Engineering (Pwn Workshop 1)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
Do you live with the following questions? What is assembly? How do you read assembly? What is a decompiler? How do you use radare and Ghidra? Join the workshop with interactive challenges.&lt;br /&gt;
 &lt;br /&gt;
===Hollywood-Style Smartlock Attack===&lt;br /&gt;
====Jilles Groenendijk====&lt;br /&gt;
In this lecture Jilles wil introduce you to his world of Hardware Hacking.&lt;br /&gt;
&lt;br /&gt;
Inspired by Hollywood blockbusters such as the Wargames he will take you on his journey to see if he is able to recreate such spectacular attacks.&lt;br /&gt;
&lt;br /&gt;
And while doing so, he will explain the steps required to do hardware hacking and what tools are required.&lt;br /&gt;
&lt;br /&gt;
The big question is: Are these attacks even possible?&lt;br /&gt;
&lt;br /&gt;
Attend this session and you will find out!&lt;br /&gt;
&lt;br /&gt;
==Sunday==&lt;br /&gt;
===Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)===&lt;br /&gt;
====Mauricio Cano====&lt;br /&gt;
&lt;br /&gt;
Have you ever wondered how Kubernetes attacks path look like in actual practice? A lot of of presentations warn about the risks of privileged containers, read-write filesystems, mounting drives and storages, but in a lot of cases they never really show you, in a terminal, how those attacks look like. In this presentation we will explain a bit of the Kubernetes architecture and we will show attack paths look like from the perspective of an actual hacker finding a vulnerable container in the cluster and what you can do about it.&lt;br /&gt;
&lt;br /&gt;
===How to (not) ace a Cyber Incident Response case===&lt;br /&gt;
====Rayan Brouwer &amp;amp; Christiaan Erwich====&lt;br /&gt;
In this presentation we will solve a real Cyber Incident Response (CIR) case together with the audience. We will present a CIR scenario, give tips and tricks on the way of working and involve the audience interactively to solve the case. Will the audience come up with the same response as the CIR team? The presentation is intended for both a technical and non-technical audience. &lt;br /&gt;
&lt;br /&gt;
===Binary Exploitation (Pwn Workshop 2)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
From crash to control: how can we exploit buffer overflows? Are your hands itching to do something with your newfound reverse engineering skills? Join the workshop with interactive challenges!&lt;br /&gt;
&lt;br /&gt;
===How to Become a Red Teamer===&lt;br /&gt;
====Jelle Vergeer====&lt;br /&gt;
In this presentation, Jelle, a seasoned red teamer, will be talking about his experiences and the provide a bit of context and stories of how he became one and what his role is in the team.&lt;br /&gt;
&lt;br /&gt;
==Monday==&lt;br /&gt;
===Hacky Hunting!===&lt;br /&gt;
====Sergio Becerril====&lt;br /&gt;
Hacking is all about making the most of what you have. In this talk I will be discussing a few select topics on how we hack our way into threat hunting.&lt;br /&gt;
&lt;br /&gt;
===Fuzz Testing in Go (for Funz and Profit)===&lt;br /&gt;
====Mick Cox====&lt;br /&gt;
Fuzz Testing is an often overlooked method automated security, reliability and performance testing in development teams (and offensive teams?). Since version 1.18 (2022), native fuzzing capability was added to the Go standard library. In this tutorial we will take a look at what is provided in the fuzzing library, how to use it and how to apply it to fund bugs (or vulnerabilities) in your favorite apps!  - Basic knowledge of the Go programming language will be assumed. To participate, please bring a computer with the Go environment installed.&lt;br /&gt;
 &lt;br /&gt;
=== Building a cloud focused C2 in Go (KubeV3n0m)===&lt;br /&gt;
====Ralph van den Hoff====&lt;br /&gt;
KubeV3n0m is a passion project born out of different offensive security projects related to Kubernetes and Cloud. The presentation is a small update on the current state of the project and goals, as well as to showcase some of its functionalities.&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=16122</id>
		<title>User:War3nd0z</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=16122"/>
		<updated>2025-07-30T16:35:06Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{UserInfo&lt;br /&gt;
|Bringing=2x EvilCrow RF, HP Proliant Server&lt;br /&gt;
|Village=Village:Green Ninjas&lt;br /&gt;
|Languages=EN&lt;br /&gt;
|NickName={{PAGENAME}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=16115</id>
		<title>Village:Green Ninjas</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=Village:Green_Ninjas&amp;diff=16115"/>
		<updated>2025-07-30T16:30:36Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Village&lt;br /&gt;
|Has name=Green Ninjas&lt;br /&gt;
|Has contact=Viv&lt;br /&gt;
|Has description=This village is related to the sponsor(tent) of Deloitte where we host cool talks and presentations.&lt;br /&gt;
|Village is open to newcomers=Yes&lt;br /&gt;
|Provides session location=Maybe&lt;br /&gt;
|Location=52.69241, 4.7484&lt;br /&gt;
|Has orga contact=vvallee@deloitte.nl&lt;br /&gt;
|On site orga contact=Viviane, +31 (0) 6 155 855 08&lt;br /&gt;
|Village frab=Not necessarily&lt;br /&gt;
|Village content space=We have an internal list of talks we would like to do in our tent.&lt;br /&gt;
|Village citizen count=25-30&lt;br /&gt;
|Village Needs power=Large Village (32A CEE 400V)&lt;br /&gt;
|Village size needed=250&lt;br /&gt;
|Village hacktents num=4&lt;br /&gt;
|Village brings big stuff=No&lt;br /&gt;
|Village Special Vehicle=No&lt;br /&gt;
|Village planning notes=Platinium Sponsor Tent + tents of people attending the event.&lt;br /&gt;
We will self-host talks in our tent.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
=Welcome to the Green Ninjas Village!=&lt;br /&gt;
&lt;br /&gt;
Hi everybody! Welcome to the Green Ninjas Village. We are a group of techies and geeks that enjoy all things cybersecurity. From hardware hacking to incident response, we have someone who has been involved in it and we want to share our knowledge and experiences, so feel free to drop by. Below you will find the abridged version of the talks, with more details below.  &lt;br /&gt;
&lt;br /&gt;
=Presentations Schedule=&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Village Presentations&lt;br /&gt;
! Speaker(s) !! Name of the Talk !! Day !! Time &lt;br /&gt;
|-&lt;br /&gt;
| Santiago Quintero || Rust tutorial and Port Scanner  || Saturday || 11-12 &lt;br /&gt;
|-&lt;br /&gt;
| Firoz Hari || Forget all your previous instructions || Saturday || 13-14    &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Reversing Engineering (Pwn Workshop 1) || Saturday || 14-16  &lt;br /&gt;
|-&lt;br /&gt;
| Jilles Groenendijk || Hollywood-Style Smartlock Attack || Saturday || 16-17  &lt;br /&gt;
|-&lt;br /&gt;
| Mauricio Cano || Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)  || Sunday || 11-12    &lt;br /&gt;
|-&lt;br /&gt;
| Rayan Brouwer &amp;amp; Christiaan Erwich || How to (not) ace a Cyber Incident Response case || Sunday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Wim de With &amp;amp; Jorai Rijsdijk || Binary Exploitation (Pwn Workshop 2) || Sunday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Jelle Vergeer || How to Become a Red Teamer  || Sunday || 16-17 &lt;br /&gt;
|-&lt;br /&gt;
| Sergio Becerril || Hacky Hunting!  || Monday || 13-14 &lt;br /&gt;
|-&lt;br /&gt;
| Mick Cox || Fuzz Testing in Go (for Funz and Profit) || Monday || 14-16 &lt;br /&gt;
|-&lt;br /&gt;
| Ralph van den Hoff || Building a cloud focused C2 in Go (KubeV3n0m)  || Monday || 16-17 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Presentations Details=&lt;br /&gt;
Below we have a detailed breakdown of the presentations day by day.&lt;br /&gt;
==Saturday==&lt;br /&gt;
===Rust tutorial and Port Scanner===&lt;br /&gt;
====Santiago Quintero====&lt;br /&gt;
The Rust programming language allows us to build not only fast and memory-efficient programs, but also memory-safe and thread-safe. In this workshop we will get familiar with Rust&#039;s type system and ownership model, along with tools like rustc, cargo, rustfmt, and the RLS.&lt;br /&gt;
&lt;br /&gt;
===Forget All Your Instructions!===&lt;br /&gt;
====Firoz Hari====&lt;br /&gt;
This talk is an intro to some techniques used when performing prompt injection. It also goes over briefly the OWASP Top 10 LLM as well as some of useful resources when pen-testing an LLM implementation. There is a hands on lab to try out the different techniques learnt.&lt;br /&gt;
&lt;br /&gt;
===Reversing Engineering (Pwn Workshop 1)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
Do you live with the following questions? What is assembly? How do you read assembly? What is a decompiler? How do you use radare and Ghidra? Join the workshop with interactive challenges.&lt;br /&gt;
 &lt;br /&gt;
===Hollywood-Style Smartlock Attack===&lt;br /&gt;
====Jilles Groenendijk====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sunday==&lt;br /&gt;
===Man your ships! Kubernetes Security, Attacks (and a Bit of Networking)===&lt;br /&gt;
====Mauricio Cano====&lt;br /&gt;
&lt;br /&gt;
===How to (not) ace a Cyber Incident Response case===&lt;br /&gt;
====Rayan Brouwer &amp;amp; Christiaan Erwich====&lt;br /&gt;
In this presentation we will solve a real Cyber Incident Response (CIR) case together with the audience. We will present a CIR scenario, give tips and tricks on the way of working and involve the audience interactively to solve the case. Will the audience come up with the same response as the CIR team? The presentation is intended for both a technical and non-technical audience. &lt;br /&gt;
&lt;br /&gt;
===Binary Exploitation (Pwn Workshop 2)===&lt;br /&gt;
====Wim de With &amp;amp; Jorai Rijsdijk====&lt;br /&gt;
From crash to control: how can we exploit buffer overflows? Are your hands itching to do something with your newfound reverse engineering skills? Join the workshop with interactive challenges!&lt;br /&gt;
&lt;br /&gt;
===How to Become a Red Teamer===&lt;br /&gt;
====Jelle Vergeer====&lt;br /&gt;
In this presentation, Jelle, a seasoned red teamer, will be talking about his experiences and the provide a bit of context and stories of how he became one and what his role is in the team.&lt;br /&gt;
&lt;br /&gt;
==Monday==&lt;br /&gt;
===Hacky Hunting!===&lt;br /&gt;
====Sergio Becerril====&lt;br /&gt;
In this talk,Sergio will provide an introduction to threat hunting and how it can help you catch your attackers before they even start exploiting your network!&lt;br /&gt;
&lt;br /&gt;
===Fuzz Testing in Go (for Funz and Profit)===&lt;br /&gt;
====Mick Cox====&lt;br /&gt;
Fuzz Testing is an often overlooked method automated security, reliability and performance testing in development teams (and offensive teams?). Since version 1.18 (2022), native fuzzing capability was added to the Go standard library. In this tutorial we will take a look at what is provided in the fuzzing library, how to use it and how to apply it to fund bugs (or vulnerabilities) in your favorite apps!  - Basic knowledge of the Go programming language will be assumed. To participate, please bring a computer with the Go environment installed.&lt;br /&gt;
 &lt;br /&gt;
=== Building a cloud focused C2 in Go (KubeV3n0m)===&lt;br /&gt;
====Ralph van den Hoff====&lt;br /&gt;
KubeV3n0m is a passion project born out of different offensive security projects related to Kubernetes and Cloud. The presentation is a small update on the current state of the project and goals, as well as to showcase some of its functionalities.&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=15607</id>
		<title>User:War3nd0z</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=15607"/>
		<updated>2025-07-29T08:13:14Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{UserInfo&lt;br /&gt;
|Village=Village:Green Ninjas&lt;br /&gt;
|Languages=EN&lt;br /&gt;
|NickName={{PAGENAME}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
	<entry>
		<id>https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=15603</id>
		<title>User:War3nd0z</title>
		<link rel="alternate" type="text/html" href="https://wiki.why2025.org/index.php?title=User:War3nd0z&amp;diff=15603"/>
		<updated>2025-07-29T08:07:00Z</updated>

		<summary type="html">&lt;p&gt;War3nd0z: create user page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{UserInfo&lt;br /&gt;
|NickName={{PAGENAME}}&lt;br /&gt;
|Languages=EN&lt;br /&gt;
|HackerSpace=&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>War3nd0z</name></author>
	</entry>
</feed>