GET /congress/2025/event/320acfbc-ca83-41bc-88e0-5cfcf4507c95/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "320acfbc-ca83-41bc-88e0-5cfcf4507c95",
    "kind": "sos",
    "name": "Betreutes hacken: Broken Access Control",
    "slug": "betreutes-hacken-broken-access-control",
    "url": "https://api.events.ccc.de/congress/2025/event/320acfbc-ca83-41bc-88e0-5cfcf4507c95/?format=api",
    "track": null,
    "assembly": "sos",
    "room": "4d734db6-fb54-460c-98fc-5f8c55025ef7",
    "location": null,
    "language": "de, en",
    "description": "(Workshop will be primarily in German and the introduction will be in German. However, most of the interaction will happen between you, your computer and maybe the person(s) next to you, so non-German-speaker should also be able to participate. I will walk around and can answer questions in English.)\r\n\r\nIn this interactive workshop, you will hunt for widespread vulnerabilities from the popular category “Broken Access Control.” In a specially designed cyber range, you will be challenged to detect and exploit security gaps and understand the dangers posed by inadequately secured access points.\r\n\r\nAfterwards, we will work together to develop solutions that will help you avoid such vulnerabilities in the future and ensure the security of your applications.\r\n\r\nTarget group: Developers (at least hobbyists) with no particular connection to IT security.\r\n\r\nTechnical requirements: You have used websites before. You can read simple code.\r\n\r\nTechnical requirements: Laptop with internet access (shared with another person if necessary). Firefox(!)-Browser (no Chrome, no Safari, no Edge).\r\n\r\nTranslated with DeepL.com (free version)",
    "schedule_start": "2025-12-28T23:00:00+01:00",
    "schedule_duration": "01:20:00",
    "schedule_end": "2025-12-29T00:20:00+01:00"
}