{"id":366,"date":"2025-06-27T15:46:27","date_gmt":"2025-06-27T15:46:27","guid":{"rendered":"https:\/\/www.saintcon.org\/?page_id=366"},"modified":"2025-08-05T00:07:12","modified_gmt":"2025-08-05T00:07:12","slug":"com-eiffel-65-blue-team","status":"publish","type":"page","link":"https:\/\/www.saintcon.org\/com-eiffel-65-blue-team\/","title":{"rendered":"Community &#8211; Eiffel65 &#8211; Blue Team"},"content":{"rendered":"<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/07\/BTC.svg\" alt=\"\"><\/p>\n<h1>Eiffel65 Blue Team Community<\/h1>\n<h1>Brought to you by: b^n and dr.seuzz<\/h1>\n<div>\n<p>In this shade of Blue we\u2019ll entertain the topics of Threat Intelligence, Threat Hunting, Forensics, and Incident Response.<\/p>\n<\/div>\n<h2>Community Details and Information<\/h2>\n<div>\n<p>Eiffel65 is a place of learning. Many are accustomed to exploits of red teaming, but it\u2019s much more common to be involved in defending a network than hacking it. Come explore the layers of the defensive security. From the inner core of incident response, where analysts and engineers pull apart the scene of the attack. To supporting roles of threat hunting, discovering what tooling doesn\u2019t catch, and forensics that digs to ground zero. And finally, threat intelligence which informs the whole apparatus to make better decisions with context from real-world hacker activity.<\/p>\n<p>At Eiffel65 we will give you hands-on opportunities to explore what it means to be on the blue side. You\u2019ll enrich indicators using OSINT. You\u2019ll investigate datasets on a device and in OpenSearch. You\u2019ll poke at phishing emails and malware. And you might even dive into the depths of forensics artifacts. Here are some things we\u2019ve prepared for you:<\/p>\n<ul>\n<li style=\"text-align: left;\">Threat Intelligence<\/li>\n<li style=\"text-align: left;\">Understanding current events<\/li>\n<li style=\"text-align: left;\">Understanding threat reports<\/li>\n<li style=\"text-align: left;\">Determining if indicators are malicious using OSINT<\/li>\n<li style=\"text-align: left;\">Creating MITRE ATT&amp;CK maps<\/li>\n<li style=\"text-align: left;\">Threat Hunting<\/li>\n<li style=\"text-align: left;\">Malware sandbox submissions<\/li>\n<li style=\"text-align: left;\">Log anomaly detection<\/li>\n<li style=\"text-align: left;\">Dumping logs to OpenSearch<\/li>\n<li style=\"text-align: left;\">Investigating logs in OpenSearch<\/li>\n<li style=\"text-align: left;\">Incident Response<\/li>\n<li style=\"text-align: left;\">Security monitoring<\/li>\n<li style=\"text-align: left;\">PCAP analysis<\/li>\n<li style=\"text-align: left;\">Collecting intrusion evidence<\/li>\n<li style=\"text-align: left;\">Phishing email analysis<\/li>\n<li style=\"text-align: left;\">Forensics<\/li>\n<li style=\"text-align: left;\">Exploring forensics artifacts<\/li>\n<li style=\"text-align: left;\">Registry and forensic image analysis<\/li>\n<\/ul>\n<p>Eiffel65 has something new for novices and experts to learn (or teach). Come test your steel and sharpen your skills. Leave with something to make you better at your day job.<\/p>\n<\/div>\n<h2>Minibadge Detail<\/h2>\n<div>\n<p>We will have a MiniBadge available at our Community.<\/p>\n<p>Details are still being worked out, but to collect our MiniBadge, come visit our booth for more details on how get this cool MiniBadge.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/FAVICON-25.svg\" alt=\"\"><\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"100\",\"header_transparent\":true,\"header_transparent_noplaceholder\":false,\"header_transparent_text_color\":\"light\",\"height\":\"viewport\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/07\\\/BTC-BG.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"overlap\":true,\"padding\":\"small\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"image\",\"props\":{\"animation\":\"parallax\",\"block_align\":\"center\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/07\\\/BTC.svg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":true,\"maxwidth\":\"xlarge\",\"parallax_scale\":\"0.6\",\"text_align\":\"center\"},\"name\":\"MAIN LOGO\"},{\"type\":\"headline\",\"props\":{\"content\":\"Eiffel65 Blue Team Community\",\"margin\":\"remove-vertical\",\"text_align\":\"center\",\"title_element\":\"h1\",\"title_style\":\"heading-small\"},\"name\":\"COMMUNITY NAME\"},{\"type\":\"headline\",\"props\":{\"content\":\"Brought to you by: b^n and dr.seuzz\",\"margin\":\"remove-vertical\",\"text_align\":\"center\",\"title_element\":\"h1\",\"title_style\":\"heading-small\"},\"name\":\"COMMUNITY NAME\"},{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>In this shade of Blue we\\u2019ll entertain the topics of Threat Intelligence, Threat Hunting, Forensics, and Incident Response.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"center\",\"text_style\":\"lead\"},\"name\":\"COMMUNITY TAGLINE\"}]}],\"props\":{\"margin\":\"large\"}}],\"name\":\"COMMUNITY HEADER\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"200\",\"id\":\"powerful-api\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"content\":\"Community Details and Information\",\"text_align\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"},\"name\":\"DETAILS AND INFORMATION\"},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Eiffel65 is a place of learning. Many are accustomed to exploits of red teaming, but it\\u2019s much more common to be involved in defending a network than hacking it. Come explore the layers of the defensive security. From the inner core of incident response, where analysts and engineers pull apart the scene of the attack. To supporting roles of threat hunting, discovering what tooling doesn\\u2019t catch, and forensics that digs to ground zero. And finally, threat intelligence which informs the whole apparatus to make better decisions with context from real-world hacker activity.<\\\/p>\\n\n\n<p>At Eiffel65 we will give you hands-on opportunities to explore what it means to be on the blue side. You\\u2019ll enrich indicators using OSINT. You\\u2019ll investigate datasets on a device and in OpenSearch. You\\u2019ll poke at phishing emails and malware. And you might even dive into the depths of forensics artifacts. Here are some things we\\u2019ve prepared for you:<\\\/p>\\n\n\n<ul>\\n\n\n<li style=\\\"text-align: left;\\\">Threat Intelligence<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Understanding current events<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Understanding threat reports<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Determining if indicators are malicious using OSINT<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Creating MITRE ATT&amp;CK maps<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Threat Hunting<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Malware sandbox submissions<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Log anomaly detection<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Dumping logs to OpenSearch<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Investigating logs in OpenSearch<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Incident Response<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Security monitoring<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">PCAP analysis<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Collecting intrusion evidence<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Phishing email analysis<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Forensics<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Exploring forensics artifacts<\\\/li>\\n\n\n<li style=\\\"text-align: left;\\\">Registry and forensic image analysis<\\\/li>\\n<\\\/ul>\\n\n\n<p>Eiffel65 has something new for novices and experts to learn (or teach). Come test your steel and sharpen your skills. Leave with something to make you better at your day job.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"center\",\"text_style\":\"lead\"},\"name\":\"Details and Information\"}]}],\"props\":{\"margin\":\"large\",\"margin_remove_bottom\":false}}],\"name\":\"COMMUNITY DETAILS\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"200\",\"id\":\"efficient-workflow\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"none\",\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"Minibadge Detail\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"none\",\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>We will have a MiniBadge available at our Community.<\\\/p>\\n\n\n<p>Details are still being worked out, but to collect our MiniBadge, come visit our booth for more details on how get this cool MiniBadge.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"large\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2025\\\/02\\\/FAVICON-25.svg\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":512,\"margin\":\"default\",\"position\":\"relative\",\"text_align\":\"center\"},\"name\":\"Feature Logo or Image\"}]}],\"props\":{\"layout\":\"1-3,2-3\",\"margin\":\"medium\"}}],\"name\":\"MAJOR FEATURE SPOTLIGHT\"}],\"version\":\"4.5.24\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eiffel65 Blue Team Community Brought to you by: b^n and dr.seuzz In this shade of Blue we\u2019ll entertain the topics of Threat Intelligence, Threat Hunting, Forensics, and Incident Response. Community Details and Information Eiffel65 is a place of learning. Many are accustomed to exploits of red teaming, but it\u2019s much more common to be involved [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-366","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/pages\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":10,"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/pages\/366\/revisions"}],"predecessor-version":[{"id":931,"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/pages\/366\/revisions\/931"}],"wp:attachment":[{"href":"https:\/\/www.saintcon.org\/wp-json\/wp\/v2\/media?parent=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}