Announcement

Collapse
No announcement yet.
Sub-Forums Topics Posts Last Post
Adrian Wood, David Mitchell, and Griffin Francis - Creating and uncovering malicious containers
In this workshop, you will get hands-on with containers and kubernetes, - starting with introductory content - learning how they work, where and how to hide or find things, how to identify indicators of compromise, indicators of attack, and how to apply analysis to gain a deeper understanding of container malware and what is going on inside containers.
Topics: 1 Posts: 1
1 1
Anthony Rose, Jake "Hubbl3" Krasnov, Vincent "Vinnybod" Rose - Evading Detection: A Beginner's Guide to Obfuscation
This is a hands-on class to learn the methodology behind malware delivery and avoiding detection. This workshop explores the inner workings of Microsoft's Antimalware Scan Interface (AMSI), Windows Defender, and Event Tracing for Windows (ETW).
Topics: 1 Posts: 1
1 1
Arnaud Soullie, Alexandrine Torrents - Pentesting Industrial Control Systems 101: Capture the Flag!
Do you want to learn how to hack Industrial Control Systems? Let’s participate in the one and only CTF in which you really have to capture a flag, by hacking PLCs and taking control of a robotic arm!
Topics: 1 Posts: 1
1 1
Arnaud Soullie, Alexandrine Torrents - Securing Industrial Control Systems from the core: PLC secure coding practices
In this workshop, you will learn how to program a PLC and connect it to a SCADA system. You will then perform attacks on this system and finally implement a sample of the TOP20 coding practices to block or detect such attacks.
Topics: 1 Posts: 1
1 1
Barrett Darnell, Wesley Thurner - Pivoting, Tunneling, and Redirection Master Class
This workshop describes various techniques used to creatively route traffic through multiple network segments. Various tools and techniques will be discussed and demonstrated.
Topics: 1 Posts: 1
1 1
Chris Greer - Hands-On TCP/IP Deep Dive with Wireshark - How this stuff really works
Let's break out Wireshark and dig deep in to the TCP and IP protocols.
Topics: 1 Posts: 4
1 4
Christopher Forte, Robert Fitzpatrick - CTF 101: Breaking into CTFs...
This workshop will start with an overview of the CTF landscape, why we do them, and what value they have in the scope of the hacking community. This workshop will include various resources, a couple walkthroughs to show how to approach CTFs, and how it may differ from "real world" hacking challenges.
Topics: 1 Posts: 1
1 1
Eigentourist - Hacking the Metal 2: Hardware and the Evolution of C Creatures
delve into the design of processors using a hardware description language, tour through a handful of assembly language programs, and then plunge into systems programming in C, with comparison and contrast to the underlying assembly language that the compiler generates. Along the way, we will build programs both entertaining and mischievous, and emerge with a deeper understanding of the secrets behind all modern digital computing.
Topics: 1 Posts: 1
1 1
Eijah, Cam - Dig Dug: The Lost Art of Network Tunneling
This workshop shows you how to punch holes through external routers to allow computers that were once hidden from the Internet to connect to each other P2P.
Topics: 1 Posts: 1
1 1
Guillaume Ross, Kathy Satterlee - Protect/hunt/respond with Fleet and osquery
In this workshop, we will learn how to use Fleet and osquery to ensure systems are protected, detect suspicious activity, hunt for attackers, and respond to incidents.
Topics: 1 Posts: 1
1 1
Hardik Shah - Finding Security Vulnerabilities Through Fuzzing
This training will start with a basic introduction to different types of vulnerabilities which are very common in softwares. Later on during the training we will first start with fuzzing a simple C program which contains these vulnerabilities. After that we will see how we fuzz real world open source softwares using fuzzers like AFL,libfuzzer and honggfuzz etc.
Topics: 1 Posts: 1
1 1
Jon Christiansen, Magnus Stubman - Hybrid Phishing Payloads: From Threat-actors to You
This workshop has been developed with the aim of giving participants hands-on experience working with sophisticated payloads and techniques used by nation-state threat actors.
Topics: 1 Posts: 1
1 1
Josh Stroschein, Ryan J Chapman, Aaron Rosenmund - The Art of Modern Malware Analysis
In this workshop, you will get hands-on experience with real-world malware and learn how to identify key indicators of compromise (IOCs), apply analysis to enhance security products to protect users and infrastructure, and gain a deeper understanding of malware behavior through reverse engineering.
Topics: 1 Posts: 1
1 1
Mauricio Velazco, Olaf Hartong - The Purple Malware Development Approach
This workshop merges offensive and defensive lab exercises to provide attendees hands-on experience on custom malware development as well as live malware analysis and response.
Topics: 1 Posts: 1
1 1
Matt Cheung - Introduction to Cryptographic Attacks
This workshop will cover many of these vulnerabilities which have shown up in the real world, including CVE-2020-0601. This will be a hands-on workshop where you will implement the attacks after each one is explained.
Topics: 1 Posts: 1
1 1
Maxwell Dulin, Zachary Minneker, Kenzie Dolan, Justin drtychai Angra - House of Heap Exploitation
This workshop is for learning heap exploit development in glibc Malloc, which is the default allocator on most Linux distrobutions. With this hands-on introduction into glibc Malloc heap exploitation you will learn how the allocator functions, heap specific vulnerability classes and to pwn with a variety of techniques.
Topics: 1 Posts: 1
1 1
Michael Solomon, Michael Register - DFIR Against the Digital Darkness: An Intro to Forensicating Evil
This class teaches students how to investigate a compromised Windows system using forensic and malware analysis fundamentals.
Topics: 1 Posts: 1
1 1
Nishant Sharma, Jeswin Mathai - Introduction to Azure Security
This workshop is a power course for Azure security, we will first cover the fundamentals and building blocks of Azure then we will take a look at the threatscape and attack vectors.
Topics: 1 Posts: 1
1 1
Phil Young, Jake Labelle - Hand On Mainframe Buffer Overflows - RCE Edition
Attendees will learn how C programs are used on mainframes, understand how to use JCL for buffer overflows, how save areas are used, common registries used for pointers, ASCII to EBCDIC machine code, and how they can hunt vulnerable binaries in their environment. Multiple hands-on labs will be instructor lead with a real mainframe provided both during and after class.
Topics: 1 Posts: 1
1 1
Remi Escourrou, Xavier Gerondeau, Gauthier Sebaux - CICD security: A new eldorado
In this fully hands-on workshop, we’ll guide you through multiple vulnerabilities that we witnessed during numerous penetration tests.
Topics: 1 Posts: 1
1 1
Rich - Introduction to Software Defined Radios and RF Hacking
This class is a beginner's introduction to practical Software Defined Radio (SDR) applications and development with an emphasis on hands-on learning.
Topics: 1 Posts: 1
1 1
Rohan Durve, Paul Laîné - Windows Defence Evasion and Fortification Primitives
The Windows Defence Evasion and Fortification Primitives workshop will walk candidates through adapting initial access, code execution, credential access and lateral movement TTPs against commonly encountered defences (such as Anti-Virus, Endpoint Detection Tooling and Windows Credential Guard). Candidates will be challenged to think critically and expand their classroom knowledge of vulnerabilities against limitations in defensive technologies on Windows 10, 11, Server 2016 and Server 2019 systems.
Topics: 1 Posts: 1
1 1
Roman Zaikin, Dikla Barda, Oded Vanunu - FROM ZERO TO HERO IN A BLOCKCHAIN SECURITY
In our workshop, we will teach you what is a Blockchain, what is a smart contract and what security vulnerabilities it possesses. Our workshop is intended for beginner to intermediate level hackers who want to learn new blockchain and crypto hacking techniques based on dApps TOP 10 v2022.
Topics: 1 Posts: 1
1 1
Sam Bowne, Elizabeth Biddlecome, Irvin Lemus, Kaitlyn Handleman - Securing Smart Contracts
Learn how blockchains, cryptocurrency, NFTs, and smart contracts work, and their most important security flaws.
Topics: 1 Posts: 1
1 1
Sam Bowne, Elizabeth Biddlecome, Irvin Lemus, Kaitlyn Handelman - Securing Web Apps
Attack Web applications with: command injection, SQL injection, Cross-Site Request Forgery, Cross-Site Scripting, cookie manipulation, Server-Side Template Injection, and more.
Topics: 1 Posts: 1
1 1
Sergei Frankoff, Sean Wilson - Automated Debugging Under The Hood...
In this workshop you will build your own programmable Windows debugger from scratch (using Python). Each component in the debugger will be built as a separate module with an accompanying lab used to explain the concepts and Windows internals that support the component.
Topics: 1 Posts: 1
1 1
Solomon Sonya - Master Class: Delivering a New Construct in Advanced Volatile Memory Analysis for Fun and Profit
This workshop introduces a new visualization construct that creates the ability to interact with memory analysis artifacts. We will cover how to conducted advanced memory analysis utilizing this brand new tool that will greatly enhance the analysis process.
Topics: 1 Posts: 1
1 1
Victor Graf and Ben Kurtz - Network Hacking 101
learn how to hack networks without needing to piss off your local coffee shop, housemates, or the Feds!
Topics: 1 Posts: 1
1 1
  •  
  • Filter
  • Time
  • Answered
  • Show
  • New Topics
Clear All
new posts
There are no conversations in this channel.
 
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.
  •  
  • Filter
  • Time
  • Answered
  • Show
  • Sort By
  • Order
Clear All
new posts
Topics Statistics Last Post
Started by The Dark Tangent, 2 weeks ago
0 responses
798 views
0 likes
Last Post The Dark Tangent  
Started by sleestak, February 2, 2022, 14:59
0 responses
1,056 views
0 likes
Last Post sleestak  
No topics found.
  • Filter
  • Time
Clear All
Working...
X