Stay In Touch
HITB2014AMS - Tech Training 7 - Hacking by Numbers: Combat Reloaded

Description:

PRICE: EUR1599  (early bird) / EUR1999 (non-early bird)

TRAINER: Georg-Christian Pranschke (Senior Security Analyst, Sensepost)

CAPACITY: 25 pax

COURSE DURATION: 2 days


THIS COURSE HAS BEEN CANCELLED

Overview

This course is considered the ultimate hacker combat training course. From the first hour, to the final few minutes, students are placed in different attacker scenarios as they race the clock to "capture the flag."

In a true SensePost style, the solutions lie much more in technique and an out-of-box thought process than in the use of scripts or tools. Each exercise is designed to teach a specific lesson and is discussed in detail upon completion with the group. With new challenges being added all the time, this course is ideal for penetration testers  who want to test their skills and/or gain exposure to new and interesting attack techniques.

This course follows directly on from HBN BlackOps. Although prior participation in an HBN course is not a prerequisite, significant exposure to hacking training, tools and techniques is highly recommended.

Who Should Attend

Information security officers, system and network administrators, security consultants, government agents will all benefit from the valuable insights provided by this class.

Key Learning Objectives

*   Target discovery and reconnaissance

*   Network mapping

*   Network traffic analysis

*   Discovery and understanding known vulnerabilities

*   Exploiting known vulnerabilities

*   Privilege escalation

*   Avoiding detection

*   Discovering and exploiting new vulnerabilities

*   Reverse engineering

*   Web application hacking

*   Database hacking

*   Tool and exploit writing

Prerequisites

This course is designed for students who have two or more years experience in performing security assessments and penetration testing. Students should be well versed in basic programming or scripting, networking and Internet technologies, Unix and Windows operating systems, basic SQL and database technologies.

In order to complete the course, students will be given a preconfigured USB image that will serve all the needs of the environment, along with all other material. Software and all course material are available upon completion.

Hardware / Software Requirements

Students will need to supply their own laptop with network connectivity (wireless and wired). We will supply the OS image (Kali) on a USB drive. Kali has minimal hardware requirements ( http://docs.kali.org/installation/kali-linux-hard-disk-install) however we recommend a relatively up to date laptop to ensure a enjoyable classroom experience.

Course Agenda

This course is considered the ultimate hacker combat training course. From the first hour, to the final few minutes, students are placed in different attacker scenarios as they race the clock to "capture the flag." In a true SensePost style, the solutions lie much more in technique and an out-of-box thought process than in the use of scripts or tools. Each exercise is designed to teach a specific lesson and is discussed in detail upon completion with the group

About the Trainer

George, a Zoologist turned Computer Scientist, is a Senior Security Analyst at SensePost. There he performs penetration tests, develops tools and is involved in the creation of course content for the Hacking by Numbers series. George likes chaining vulnerabilities and difficult post-exploitation setups. George also is German, a fact that is often pointed out to him - he has yet to figure out why

Early Bird Registration Ends on Feb 1st 2014

We are sorry but registration for this event is now closed.

Please contact us if you would like to know if spaces are still available.