During this comprehensive course, tools and methodologies that are used during penetration tests in enterprise network/application environments will be detailed. The course will utilize a lab environment for a hands-on instruction of manual penetration testing methods, in addition to training for use of exploitation frameworks, such as Metasploit.
Focus will be geared towards methodology, processes, vectors, tools, and techniques used for exploitation. By the end of the course, the student will have an in-depth understanding of the underlying principals of network/application exploitation and will have gained experience in the successful execution of attacks.
Minimum Course Requirements:
Bring a Laptop with: 8GB of RAM at Minimum and Quad-Core Processor at minimum with the ability to Run Virtual Machines
Understanding of Basic Networking Concepts
Basic Linux Comprehension
Target Audience: This seminar is geared towards those seeking to enter the information security industry while also enriching those who seek to develop the skills and experience necessary to succeed as a penetration tester(for fun and for profit).
Rod Soto has over 15 years of experience in information technology and security. He has spoken at ISSA, ISC2, OWASP, RSA, DerbyCon,BlackHat,
DEFCON, Hackmiami, Bsides and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision, VICE and CNN. Rod Soto was the
winner of the 2012 BlackHat Las vegas CTF competition and is the founder and lead developer of the Kommand && KonTroll/ NOQRTRCTF
competitive hacking Tournament series. He has also architected and co-develop military cyber ranges.
For more information:
The goal of the training is to give a red teamer's perspective to hackers and penetration testers who want to up their game of VAPT. We will start first with the fundamental concepts of red teaming and its process followed by differentiating how red-teaming is different than normal pentesting and the benefits of having a red-teaming approach towards application security testing.
After this, the training will build upon from the ground up starting with the fundamental concepts of Information Gathering and Recon + various un-common tools and techniques to gather much more information about a target. We will then share red-teaming techniques for VA of Web and Mobile Applications where we will discuss various tools and tricks to find more bugs which will be followed by exploitation and data extraction methodologies. Not only will we be going through various automated tools and manual analysis, but the focus will also be on making the tools work efficiently and effectively by tweaking and debugging them.
This will also include multiple case studies of interesting Business Logic vulnerabilities and how to spot them. Then we will cover numerous pivoting and privilege escalation mechanisms that help a red teamer move swiftly inside a corporate network without alerting the SOCs. The training will be packed with tons of real-life case studies we encounter during our staple + BONUS: A step by step case study of how we owned various pharmaceutical devices inside a corporate manufacturing network of a million dollar pharma client who wanted more than VAPT.
Key Learning Objectives:
Red Teaming and its approaches
Setting up a lightweight testing environment for maximum efficiency
Hunting for bugs and vulnerabilities that slip past automated scanners
Manual Exploitation of critical vulnerabilities and customizing public tools to work better
Data exfiltration techniques
Being stealthy, clean yet efficient while walking inside corporate networks
Interesting Case Studies
Hardware and Software Requirements
Laptop with Linux (Kali preferred in Virtual Machine) and min 4 GB ram (8 GB if VM)
Working Internet Connection via LAN and WiFi
Basic pentesting tools like Burp Suite (Pro preferred), Sqlmap and scripting engines like python and perl etc
What Students will receive
Free Hardcopy/Ebook of 3 Books (worth 150 EUR) to guide students from the ground up wrt. Hacking and Red Teaming tactics:
Kali Linux - Ethical Hackers Cookbook
Hands On - Red Team Tactics
Kali Linux - Ethical Hackers Cookbook (Second Edition) to be released in March (2019)
Aman Sachdev: Aman Sachdev is a programmer at heart and an information security professional with 5+ years of experience in Information Security Training and Testing has trained over 5000 individuals. His love for breaking challenging WAFs landed him in the core team as a red team pentester at Bugsbounty. Aman has done his Bachelor's in Computer Applications and also holds an OSCP certification apart from his vast experience in web application development. At BugsBounty he solves cybersecurity problems in the day and creates them at night. He has presented at numerous security conferences including RSA, CONFIDENCE Poland and CONFIDENCE London among others.
Himanshu Sharma (Co-Trainer): : Himanshu Sharma, has been in the field of bug bounty since 2009 and has been listed in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&T, Avira, and many more with hall of fame listings as proofs. . He has helped celebrities such as Harbhajan Singh in recovering their hacked accounts, and also assisted an international singer in tracking down his hacked account and recovering it. He has been a speaker at multiple international conferences Botconf '13, Confidence 2018 and RSA Asia Pacific and Japan '18 . He also spoke at IEEE Conference in California and Malaysia as well as for TedX. Currently, he is the cofounder of BugsBounty, a crowd-sourced security platform for ethical hackers and companies interested in cyber services. He also authored a book on Kali Linux titled "Kali Linux - An Ethical Hacker's Cookbook"
For more information:
This comprehensive one-day course will introduce both novice and advanced reverse engineers to the powerful features of Binary Ninja, a relatively new binary analysis tool. Students will hit the ground running with a fast paced comprehensive overview of Binary Ninja’s user interface before diving directly into the defining features of the tool: the Binary Ninja Intermediate Languages, or BNIL.
We will cover both the Low Level IL and Medium Level IL and why they are both superior to native disassembly for program analysis. From there, we will work in-depth with the Python API and explore how to develop plugins to serve as force multipliers in students’ analysis tasks; this will include techniques that are relatively unknown, such as automating creation of types and structures.
Finally, students will work with the various patching methods available in Binary Ninja, including the embedded Shell code C Compiler, to develop both exploits and shell code payloads from within Binary Ninja. Further advanced topics may be covered if time permits.
Minimum Course Requirements:
This training is tailored for those interested in reverse engineering
with at least a basic familiarity with an assembly language,
particularly x86/x64 or ARM. Additionally, some level of competence in
Python is expected. Basic knowledge of C/C++ will also be helpful.
What will be provided?
A USB drive containing the slide deck and all example scripts and binaries
A voucher for a free copy of Binary Ninja Personal edition (which can
also be upgraded to Commercial at a pro-rated price)
Josh Watson is a Senior Security Engineer at Trail of Bits and an
active member of the Binary Ninja community. He has published numerous
articles about reverse engineering with the Binary Ninja APIs and
released several open source plugins and tools. Due to his intimate
knowledge of its features and API, he is often confused for a Binary
For more information: