BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidescharm2026//speaker//FQNMR7
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidescharm2026-7LTDR9@pretalx.com
DTSTART;TZID=EST:20260425T140000
DTEND;TZID=EST:20260425T145000
DESCRIPTION:What started as a Cloud Village CTF at DC33 turned into a priva
 te API for CloudShell with persistent access to free compute\, networking\
 , and storage. We’ll look at console/non-API/API barriers\, automation o
 f a non-API service\, IAM obfuscation\, logging/monitoring\, user lock out
 \, overcoming file/container resets\, and backdoors.
DTSTAMP:20260417T061256Z
LOCATION:Track 1
SUMMARY:CloudShell Abuse: a CTF\, API\, and persistent access to CPU/networ
 k/storage - Jenko Hwong\, Chris Ryan
URL:https://pretalx.com/bsidescharm2026/talk/7LTDR9/
END:VEVENT
END:VCALENDAR
