Sub-Forums
Topics
Posts
Last Post
Advanced Wireless Attacks Against Enterprise Networks
Learn how to carry out sophisticated wireless attacks against corporate infrastructure.
Topics: 1
Posts: 1
1
Topics
1
Posts
by Dark Tangent
June 22, 2021, 22:43
June 22, 2021
Last Post
Analysis 101 and 102 for the Incident Responder
You have a theory about something you have found while roaming the network or conducting your own hackfest, but how do you go about proving it?
Topics: 1
Posts: 1
1
Topics
1
Posts
by Dark Tangent
June 7, 2021, 03:17
June 7, 2021
Last Post
Bug bounty Hunting Workshop
I will show you a path to be a bug bounty hunter, from my experience starting by chance and from scratch.
Topics: 1
Posts: 1
1
Topics
1
Posts
June 7, 2021
Last Post
Digital Forensics & IR Against the Dark Arts
Using forensic and malware analysis fundamentals, learn how to analyze malicious downloaders, phishing emails, and malicious spam.
Topics: 1
Posts: 11
1
Topics
11
Posts
by number6
August 7, 2021, 00:32
August 7, 2021
Last Post
Evading Detection a Beginner's Guide to Obfuscation
Our mission is to identify how they plan on securing their systems and avoid being identified as a threat.
Topics: 1
Posts: 1
1
Topics
1
Posts
June 7, 2021
Last Post
Finding security Vulnerabilities through Fuzzing
How to use different types of fuzzers to find software vulnerabilities.
Topics: 1
Posts: 6
1
Topics
6
Posts
by Dark Tangent
June 23, 2021, 04:29
June 23, 2021
Last Post
From ZERO To HERO In Web Security Research
How to find vulnerabilities in web security according to the latest methods and techniques.
Topics: 1
Posts: 3
1
Topics
3
Posts
by number6
June 18, 2021, 14:14
June 18, 2021
Last Post
Hacking the Metal: An Introduction to Assembly Language Programming
Learn about assembly language programming, write some real-world code, play the role of reverse engineer and try your hand at some guided malware analysis.
Topics: 1
Posts: 1
1
Topics
1
Posts
June 7, 2021
Last Post
House of Heap Exploitation
Heap exploitation is a subject that has evaded many people for years for one reason: they focus on the techniques instead of the allocator.
Topics: 1
Posts: 3
1
Topics
3
Posts
July 31, 2021
Last Post
Inspecting Signals from Satellites to Shock Collars
By examining several topics that are rarely presented together, this workshop provides the introduction to wireless hacking that we both wish we had when starting out.
Topics: 1
Posts: 3
1
Topics
3
Posts
by hdanielson
July 18, 2021, 11:57
July 18, 2021
Last Post
Learning to Hack Bluetooth Low Energy with BLE CTF
Learn the fundamentals of interacting with and hacking Bluetooth Low Energy services through a series of Bluetooth low energy challenges in a capture the flag format.
Topics: 1
Posts: 3
1
Topics
3
Posts
by Cyph3r
June 20, 2021, 18:26
June 20, 2021
Last Post
Modern Malware Analysis for Threat Hunters
You will learn to analyze malicious office documents, identify signs of packing, defeat obfuscation and other anti-analysis techniques and use traffic analysis.
Topics: 1
Posts: 1
1
Topics
1
Posts
by Dark Tangent
June 7, 2021, 06:09
June 7, 2021
Last Post
Network Analysis with Wireshark
Learn to understand packet activity, abnormalities and anomalies to detect attacks, troubleshoot network problems, and perform network forensics.
Topics: 2
Posts: 11
Last Post:
2
Topics
11
Posts
August 6, 2021
Last Post
Secure Messaging Over Unsecured Transports
Many specialized secure messaging apps have sprung up to address the challenge of end-to-end secured messaging. We will build our own.
Topics: 1
Posts: 1
1
Topics
1
Posts
by Dark Tangent
June 22, 2021, 23:13
June 22, 2021
Last Post
The Joy of Reverse Engineering
Introduction to software reverse engineering using static and dynamic techniques with the Ghidra disassembler and WinDbg debugger.
Topics: 1
Posts: 2
1
Topics
2
Posts
by d@em0n
June 29, 2021, 08:23
June 29, 2021
Last Post
Windows Internals
Explore the structure of Windows executable files and the operating
system itself to better understand programs, services, malware, and
defenses.
Topics: 1
Posts: 1
Last Post:
1
Topics
1
Posts
June 7, 2021
Last Post
Writing Golang Malware
Learn how to design and build their own multi-platform Golang-based implants and c2 frameworks by building on samples provided.
Topics: 2
Posts: 3
2
Topics
3
Posts
August 2, 2021
Last Post
There are no conversations in this channel.
Please log in to your account to view your subscribed posts.
| Topics | Statistics | Last Post | ||
|---|---|---|---|---|
|
Started by Dark Tangent, June 23, 2021, 22:52
|
110 responses
4,066 views
0 reactions
|
Last Post
by user9320
|
||
|
Started by Dark Tangent, June 23, 2021, 22:53
|
7 responses
2,591 views
0 reactions
|
Last Post
by gavin@tor
|
No topics found.
-
Page of 0
