Training Schedule - November 14th 2025
👉 Get Your Training Tickets Now
NOTICE: All Training Sessions are at The University of North Florida, University Center, located at: 12000 Alumni Drive, Jacksonville, FL 32224
Please check the posted schedule for updates. The schedule is subject to change.
The schedule and event details are also available on HackerTracker.app
The floor plan for Friday and Saturday can be found here: Map
| Time | Track 1 | Track 2 | Track 3 | Track 4 | |
|---|---|---|---|---|---|
| 09:00-12:00 |
# It's a Literal Cluster F*** ## Over-Engineering Your Homelab 101 and All the Stuff They Don't Teach You at the Academy! Christian McLaughlin |
Binary Jiu-jitsu: White Belt Fundamentals Joshua Connolly |
The Burglar’s Guide to Web Application Testing: Stealing Secrets Like a Hobbit, a hands-on, story-driven workshop Kevin Johnson |
No Morning Session | |
| 12:00-13:00 | Lunch Break - Offsite | ||||
| 13:00-17:00 |
# It's a Literal Cluster F*** ## Over-Engineering Your Homelab 101 and All the Stuff They Don't Teach You at the Academy! Christian McLaughlin |
Binary Jiu-jitsu: White Belt Fundamentals Joshua Connolly |
The Burglar’s Guide to Web Application Testing: Stealing Secrets Like a Hobbit, a hands-on, story-driven workshop Kevin Johnson |
From Datasheet to .data Section: Acquiring Firmware from a Code-Protected Microcontroller RJ Crandall |
|
Training
| # It's a Literal Cluster F*** ## Over-Engineering Your Homelab 101 and All the Stuff They Don't Teach You at the Academy! |
|
This isn’t your traditional homelab talk it’s a masterclass in overengineering the hell out of your homelab. Why? Because we can. And more importantly because that's how real infrastructure is built. Most talks stop at “how to set up a homelab” or “what services to deploy.” Not this one. In this hands-on workshop, we’ll go beyond Docker and VMs to explore how engineers and architects design resilient, scalable systems in production environments and how you can recreate those same practices at home. You’ll learn how to build and manage:
This workshop is ideal for tinkerers, SREs, engineers, and anyone who wants to simulate real-world production infrastructure at home. You’ll walk away with hands-on knowledge and resume-ready skills that make you stand out from the crowd. Trainer: Christian McLaughlin Requirements: A Linux Laptop with the latest version of KVM installed (Lab VM instances can be provided to users with Windows or Mac devices however they will need an SSH Client) Cost: $200 |
| Binary Jiu-jitsu: White Belt Fundamentals |
|
Binary exploitation can feel overwhelming for beginners. With so many tools, techniques, and architectures to learn, it’s easy to get lost without a structured path. Binary Jiu-Jitsu is designed to guide students through the fundamentals of binary exploitation using a skill-based, hands-on approach inspired by martial arts training. In this workshop, we’ll cover the essential building blocks for exploiting simple 64-bit Linux ELF binaries. Attendees will learn the fundamentals of computer architecture, reverse engineering with Ghidra, debugging with GDB, finding stack-based buffer overflows, and developing custom exploits using pwntools. Throughout the session, participants earn “stripes” by completing progressively harder hands-on challenges in a live CTFd environment. By the end, students will have the knowledge — and practical skills — to identify vulnerabilities, write working exploits, and pop their first shell. By the end of this session, participants will be able to:
Trainer: Joshua Connolly Requirements: Computer with Virtualbox installed Cost: $200 |
| The Burglar’s Guide to Web Application Testing: Stealing Secrets Like a Hobbit, a hands-on, story-driven workshop |
|
This workshop takes you on a journey through the methodical process of web application penetration testing, equipping you with practical skills to uncover vulnerabilities that often remain hidden from plain sight. Like a careful burglar (I mean Hobbit), planning the perfect heist, you'll learn how to systematically approach security assessments with precision and purpose. Kevin Johnson will guide you through each phase of the testing lifecycle, sharing battle-tested techniques refined over years of testing applications and APIs. From initial reconnaissance and OSINT gathering to the careful mapping of attack surfaces, Kevin will demonstrate techniques that have successfully uncovered critical vulnerabilities in real-world applications. Drawing from his experience, he'll share war stories of unexpected discoveries—those precious "ring" moments where seemingly small findings led to significant security risk. Through hands-on demonstrations, you'll learn to move through systems with the stealth and cleverness of the most unlikely hero, identifying weaknesses that others have overlooked and developing the practical skills to document and communicate these findings effectively to development teams and stakeholders alike. Trainer: Kevin Johnson Requirements: TBD Cost: $200 |
| From Datasheet to .data Section: Acquiring Firmware from a Code-Protected Microcontroller |
|
You will learn the following material in the specific context of a PIC18 microcontroller:
What this workshop will NOT teach you:
Trainer: RJ Crandall Requirements: A Laptop with ability to run a 64-bit Intel virtual machine. VM Specifications:
Tested with: * Ubuntu 24.04.3 LTS Host (AMD) * VirtualBox 7.1.12 Hardware kits will be loaned to attendees and available for purchase separately. Cost: $200 |