The hackfest lab sessions run in what is loosely referred to as "full duplex mode" in that it's acceptable to speak out in a lab format, offer information specific to a discussion, correct or clarify. The group members will ask questions as they work on the "targets" that are setup for everyone to exploit. More experienced or trained festers usually slide happily into a lead role --> holding the flashlight for the rest of our OSI level analysis. Local professionals from the past year (who interact as peers) include: University of Phoenix Security Department, GoDaddy Security Team, Department of Energy Security Contractor from Palo Verde Nuclear Facility It's common for people to pair off to go into deep discussion of a subject where they have common research or interests. We have a wide cross section of professionals and hobbyists, and skill levels from novice to l33t hackers. David Demland, Adjunct Educator at DeVry started to give his students extra credit for attending my Hackfests in 2009 (right after I started to hold monthly and bimonthly hackfests ). Eventually we were able to get sufficient support from DeVry's faculty to meet at the University on Dunlap in the cisco lab, room 234. We pass out LiveDVD tools media (Backtrack 5 r3 a pentest distribution) and everyone uses the Lab workstations after booting into the CD/DVD toolkit. You can take the LiveDVD home if you like. We (volunteers and professionals or anyone who can be considered a SMA [ subject matter authority] lead willing participants in the use of pentest tools, basic linux network analysis toward an understanding of the concepts in each exercise or system example exploit (aka FLag) without explicitly showing anyone "how to hack". Our focus is deep analysis of protocol attack vectors as they exist in nature and our mission is to provide a safe playground that is ultimately educational. But most of the time this just looks like people finding obvious holes in the universe. *Be careful attending the PLUG Hackfests, we intend to drag everyone (even the unwilling observers) kicking and screaming from the "Security Matrix" where the truth provides a veritiable time machine view of cyberwars ahead. * You can read more about Hackfesting on ClownSociety: http://www.it-clowns.com/c/index.php/hackfests/ -- (503) 754-4452 Android (623) 239-3392 Skype (623) 688-3392 Google Voice ** it-clowns.com Chief Clown