GET /congress/2025/event/e218d7af-ed23-5ac0-b6ae-8fe700791940/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "e218d7af-ed23-5ac0-b6ae-8fe700791940",
    "kind": "assembly",
    "name": "Workshop Network-Security + \"Darknet\" [FLINTA* only]",
    "slug": "workshop-network-security-darknet",
    "url": "https://api.events.ccc.de/congress/2025/event/e218d7af-ed23-5ac0-b6ae-8fe700791940/?format=api",
    "track": null,
    "assembly": "haecksen-assembly",
    "room": "dff47472-19ff-586e-8862-e94a89dd347b",
    "location": null,
    "language": "en",
    "description": "***FLINTA*-only***\r\nThis one-hour workshop focuses on the secure and responsible use of offensive security tools. We'll take a practical look at Metasploit, Torify, and related tools to understand how to test attack surfaces while maintaining privacy and anonymity.\r\n\r\nTogether, we'll discuss setting up a small test environment, routing traffic through Tor and proxy chains, and discuss the limits of technical anonymization—including legal and ethical aspects.\r\n\r\nObjective:\r\nYou'll learn how to use Metasploit securely in a lab setup, what Torify can do, and where caution is advised.\r\n\r\nLevel: Intermediate (basic knowledge of Linux and networking recommended)\r\nDuration: Approx. 1 hour\r\nWhat to bring: Laptop with Linux (VM is acceptable), Metasploit, and Tor tools",
    "schedule_start": "2025-12-28T11:15:00+01:00",
    "schedule_duration": "01:00:00",
    "schedule_end": "2025-12-28T12:15:00+01:00"
}