BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:88f6f76f-ecd4-4b4f-ac4b-474497b59504
DTSTAMP:20260519T142831Z
SUMMARY:Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah?
DESCRIPTION:Python 3.8\, released October 2019\, boasts a new security feat
 ure called “audit hooks”. According to PEP 578 and PEP 551\, the purpo
 se of audit hooking is to allow transparency into Python’s runtime so th
 at events can be monitored and logged just like any other process. While a
 dditional insight is great for defenders\, it's likely to become another h
 urdle for attackers to overcome in the same vein as PowerShell. Y'all tryn
 a bypass these audit hooks or nah? Come through.\n\nSpeaker(s): Leron Gray
 \n\nLocation: Red Team Vlg\n\nDiscord: https://discord.com/channels/708208
 267699945503/726477357820411944\n\nEvent starts: 2020-08-08 09:45 (09:45 A
 M) PDT (UTC -07:00)\n\nEvent ends: 2020-08-08 10:45 (10:45 AM) PDT (UTC -0
 7:00)\n\nFor the most up-to-date information\, please either visit https:/
 /info.defcon.org\, or use HackerTracker\, which is available for iOS and A
 ndroid. This is an automated message\, and this data was last modified 202
 0-07-29T01:26 (UTC).
URL:https://forum.defcon.org/node/234320
DTSTART:20200808T174500Z
DTEND:20200808T184501Z
LOCATION:Red Team Vlg
END:VEVENT
END:VCALENDAR
