<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan</id>
	<title>HOPE Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan"/>
	<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php/Special:Contributions/Dan"/>
	<updated>2026-05-23T19:24:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.3</generator>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10381</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10381"/>
		<updated>2025-07-27T01:45:52Z</updated>

		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
[[File:Dannagle-hackingnetwork-apis-presentation.jpg|thumb|Dan Nagle presenting Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are no materials needed to attend. However, you may walk away with a free Packet Sender sticker for your laptop (while supplies last). &lt;br /&gt;
&lt;br /&gt;
[[File:Pslogo256.png|thumb|Packet Sender logo (Dan&#039;s open source tool)]]&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10380</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10380"/>
		<updated>2025-07-27T01:44:36Z</updated>

		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
[[File:Dannagle-hackingnetwork-apis-presentation.jpg|thumb|Dan Nagle presenting Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are no materials needed to attend. However, you may walk away with a free Packet Sender sticker for your laptop (while supplies last). &lt;br /&gt;
&lt;br /&gt;
[[File:Pslogo256.png|thumb|Packet Sender logo]]&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10379</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10379"/>
		<updated>2025-07-27T01:43:48Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Presenter(s) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
[[File:Dannagle-hackingnetwork-apis-presentation.jpg|thumb]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are no materials needed to attend. However, you may walk away with a free Packet Sender sticker for your laptop (while supplies last). &lt;br /&gt;
&lt;br /&gt;
[[File:Pslogo256.png|thumb|Packet Sender logo]]&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=File:Dannagle-hackingnetwork-apis-presentation.jpg&amp;diff=10378</id>
		<title>File:Dannagle-hackingnetwork-apis-presentation.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=File:Dannagle-hackingnetwork-apis-presentation.jpg&amp;diff=10378"/>
		<updated>2025-07-27T01:43:10Z</updated>

		<summary type="html">&lt;p&gt;Dan: Dan Nagle presenting Hacking Network APIs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Dan Nagle presenting Hacking Network APIs&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10377</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10377"/>
		<updated>2025-07-27T01:35:11Z</updated>

		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are no materials needed to attend. However, you may walk away with a free Packet Sender sticker for your laptop (while supplies last). &lt;br /&gt;
&lt;br /&gt;
[[File:Pslogo256.png|thumb|Packet Sender logo]]&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10376</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10376"/>
		<updated>2025-07-27T01:34:13Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Materials */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are no materials needed to attend. However, you may walk away with a free Packet Sender sticker for your laptop (while supplies last). &lt;br /&gt;
&lt;br /&gt;
[[File:Pslogo256.png|thumb]]&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=File:Pslogo256.png&amp;diff=10375</id>
		<title>File:Pslogo256.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=File:Pslogo256.png&amp;diff=10375"/>
		<updated>2025-07-27T01:33:37Z</updated>

		<summary type="html">&lt;p&gt;Dan: Logo for Packet Sender&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Logo for Packet Sender&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10373</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10373"/>
		<updated>2025-07-26T00:47:34Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
=== Part 1: Reverse Engineering ===&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
=== Part 2: Discovering Malware ===&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
=== Part 3: Latency Vs Throughput ===&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
=== Q&amp;amp;A ===&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10372</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10372"/>
		<updated>2025-07-26T00:43:56Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
This is a 3-part demo series. &lt;br /&gt;
&lt;br /&gt;
## PART 1: REVERSE-ENGINEERING AN IOT DEVICE&lt;br /&gt;
&lt;br /&gt;
A Raspberry Pi in a closed network will be running custom TCP and UDP services (for our example, a music player) with a black box client app used for control. The device’s commands will be captured and then replayed to verify the tool was successfully reverse-engineered. Once this is accomplished, the demo will lead to part 2.&lt;br /&gt;
&lt;br /&gt;
## PART 2: DISCOVERING MALWARE ON AN IOT DEVICE&lt;br /&gt;
&lt;br /&gt;
Inviting an IoT device to your home network is a risk. How risky? Fortunately, this demo is on a closed network. The techniques learned in Part 1 will be augmented by capturing and analyzing the malware communication happening with our IoT music player.&lt;br /&gt;
&lt;br /&gt;
## PART 3: LATENCY VS THROUGHPUT&lt;br /&gt;
&lt;br /&gt;
There will be demonstrations regarding latency and throughput by forced degradation of the network. Latency and throughput are the 2 most important metrics for network performance, and they are often confused. Hopefully, there will be no more confusion after these demos.&lt;br /&gt;
&lt;br /&gt;
## Q&amp;amp;A&lt;br /&gt;
&lt;br /&gt;
Bring your questions! Otherwise, we did not actually need the room for 2 hours.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10371</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10371"/>
		<updated>2025-07-26T00:41:14Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Day / Time / Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
Dan&#039;s presentation &#039;&#039;Things You Wish You Knew About Software Testing&#039;&#039;, Tobin 201/202 10am also on Saturday, Day 2, is completely unrelated to this Workshop. However, he would be thrilled if you attended both. Much of that talk were inspired by hard lessons learned from developing the tools in this workshop.&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10370</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10370"/>
		<updated>2025-07-26T00:35:54Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Presenter(s) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
* https://dannagle.com/&lt;br /&gt;
* https://github.com/dannagle&lt;br /&gt;
* https://www.linkedin.com/in/dannagle/&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10369</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10369"/>
		<updated>2025-07-26T00:34:29Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Required Software / What to bring */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10368</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10368"/>
		<updated>2025-07-26T00:34:00Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything. However, if you wish to study the tools that will be shown (all free and open source), here are relevant links. &lt;br /&gt;
&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://www.wireshark.org/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Some helpful links worth reviewing.&lt;br /&gt;
&lt;br /&gt;
* https://packetsender.com&lt;br /&gt;
* https://wireshark.org&lt;br /&gt;
* https://raspberrypi.org&lt;br /&gt;
* https://videolan.org&lt;br /&gt;
* https://ubuntu.com&lt;br /&gt;
* https://iwl.com/products/kmax&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://en.wikipedia.org/wiki/User_Datagram_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transmission_Control_Protocol&lt;br /&gt;
* https://en.wikipedia.org/wiki/Transport_Layer_Security&lt;br /&gt;
* https://en.wikipedia.org/wiki/OSI_model&lt;br /&gt;
* https://en.wikipedia.org/wiki/IPv6&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10367</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10367"/>
		<updated>2025-07-26T00:24:47Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Hacking Network APIs workshop */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
* Cost: Free for everybody.&lt;br /&gt;
* You do not need to bring anything. This is basically a demo-heavy extended conference talk. &lt;br /&gt;
* Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
* There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
* It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
You do not need to bring anything. However, if you wish to study the tools that will be shown (all free and open source), here are relevant links. &lt;br /&gt;
&lt;br /&gt;
* https://github.com/dannagle/PacketSender&lt;br /&gt;
* https://github.com/dannagle/PiPlayer&lt;br /&gt;
* https://www.wireshark.org/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10366</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10366"/>
		<updated>2025-07-26T00:11:19Z</updated>

		<summary type="html">&lt;p&gt;Dan: /* Hacking Network APIs workshop */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
- Cost: Free&lt;br /&gt;
- You do not need to bring anything.&lt;br /&gt;
- Some basic computer networking knowledge is helpful, but not required&lt;br /&gt;
- There is time budgeted for Q&amp;amp;A during and after. The demos takes 1.5 hours if no questions are asked.&lt;br /&gt;
- It is a 3-part series. They build on each other, but you can join in the middle and not be too far behind. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10365</id>
		<title>Hacking Network APIs Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Hacking_Network_APIs_Workshop&amp;diff=10365"/>
		<updated>2025-07-25T23:54:20Z</updated>

		<summary type="html">&lt;p&gt;Dan: Editing the page for the workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Hacking Network APIs workshop =&lt;br /&gt;
&lt;br /&gt;
[[File:Hacking-network-apis-setup.png|thumb|Setup for Hacking Network APIs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
A foundational component of communication between devices is the TCP/IP network stack. Web browsing, streaming video, secure control, and innumerable other applications are built upon this technology. This three-part demonstration will use open source tools to focus on the data transfer components UDP and TCP while targeting an IoT device. Part One is reverse engineering the network commands to better understand them and then mimic it (a common attack strategy). Network protocols will be discussed during this process. Armed with our new knowledge and skills, Part Two will take them a step further to discover and analyze malware present on the IoT device. Part Three will cover fundamentals of network latency versus network throughput by forced network degradation. This presentation is light on slides and heavy on demos.&lt;br /&gt;
&lt;br /&gt;
== Day / Time / Location ==&lt;br /&gt;
Day 2, Saturday, 16-August-2025, 12:30pm - 2:30pm&amp;lt;br&amp;gt;&lt;br /&gt;
Tobin 221 (Workshop B)&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop&amp;lt;br&amp;gt;-- please show up early to ensure a seat at Tobin 221 (Workshop B).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
&lt;br /&gt;
Dan Nagle&lt;br /&gt;
&lt;br /&gt;
== Materials ==&lt;br /&gt;
&lt;br /&gt;
Any materials needed to participate in this workshop will be available at-cost.&amp;lt;br&amp;gt;&lt;br /&gt;
Observers are welcome at no cost.&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;To do the hands-on portion for this workshop:&amp;lt;br&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Materials Cost: None&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Required Software / What to bring ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=File:Hacking-network-apis-setup.png&amp;diff=10364</id>
		<title>File:Hacking-network-apis-setup.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=File:Hacking-network-apis-setup.png&amp;diff=10364"/>
		<updated>2025-07-25T23:53:42Z</updated>

		<summary type="html">&lt;p&gt;Dan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Raspberry Pi setup to hack some network APIs!&lt;/div&gt;</summary>
		<author><name>Dan</name></author>
	</entry>
</feed>