HackMiami Con 7

Training

Red Teaming as a Service: Simulating Blackhat Attacks for Organisations

By Aman Sachdev and Himanshu Sharma

Register Now!
$1499.99


The goal of the training is to give a red teamer's perspective to hackers and penetration testers who want to up their game of VAPT. We will start first with the fundamental concepts of red teaming and its process followed by differentiating how red-teaming is different than normal pentesting and the benefits of having a red-teaming approach towards application security testing.

After this, the training will build upon from the ground up starting with the fundamental concepts of Information Gathering and Recon + various un-common tools and techniques to gather much more information about a target. We will then share red-teaming techniques for VA of Web and Mobile Applications where we will discuss various tools and tricks to find more bugs which will be followed by exploitation and data extraction methodologies. Not only will we be going through various automated tools and manual analysis, but the focus will also be on making the tools work efficiently and effectively by tweaking and debugging them.

This will also include multiple case studies of interesting Business Logic vulnerabilities and how to spot them. Then we will cover numerous pivoting and privilege escalation mechanisms that help a red teamer move swiftly inside a corporate network without alerting the SOCs. The training will be packed with tons of real-life case studies we encounter during our staple + BONUS: A step by step case study of how we owned various pharmaceutical devices inside a corporate manufacturing network of a million dollar pharma client who wanted more than VAPT.


Key Learning Objectives:

Red Teaming and its approaches
Setting up a lightweight testing environment for maximum efficiency
OSINT techniques
Hunting for bugs and vulnerabilities that slip past automated scanners
Manual Exploitation of critical vulnerabilities and customizing public tools to work better
Data exfiltration techniques
Network Pivoting
Being stealthy, clean yet efficient while walking inside corporate networks
Interesting Case Studies


Hardware and Software Requirements

Laptop with Linux (Kali preferred in Virtual Machine) and min 4 GB ram (8 GB if VM)
Working Internet Connection via LAN and WiFi
Basic pentesting tools like Burp Suite (Pro preferred), Sqlmap and scripting engines like python and perl etc
Virtualbox/VMware

What Students will receive

Free Hardcopy/Ebook of 3 Books (worth 150 EUR) to guide students from the ground up wrt. Hacking and Red Teaming tactics:

Kali Linux - Ethical Hackers Cookbook
Hands On - Red Team Tactics
Kali Linux - Ethical Hackers Cookbook (Second Edition)  to be released in March (2019)



Register Now!
$1499.99


Trainers Biographies


Aman Sachdev: Aman Sachdev is a programmer at heart and an information security professional with 5+ years of experience in Information Security Training and Testing has trained over 5000 individuals. His love for breaking challenging WAFs landed him in the core team as a red team pentester at Bugsbounty. Aman has done his Bachelor's in Computer Applications and also holds an OSCP certification apart from his vast experience in web application development. At BugsBounty he solves cybersecurity problems in the day and creates them at night. He has presented at numerous security conferences including RSA, CONFIDENCE Poland and CONFIDENCE London among others.



Register Now!
$1499.99


Himanshu Sharma (Co-Trainer): : Himanshu Sharma, has been in the field of bug bounty since 2009 and has been listed in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&T, Avira, and many more with hall of fame listings as proofs. . He has helped celebrities such as Harbhajan Singh in recovering their hacked accounts, and also assisted an international singer in tracking down his hacked account and recovering it. He has been a speaker at multiple international conferences Botconf '13, Confidence 2018 and RSA Asia Pacific and Japan '18 . He also spoke at IEEE Conference in California and Malaysia as well as for TedX. Currently, he is the cofounder of BugsBounty, a crowd-sourced security platform for ethical hackers and companies interested in cyber services. He also authored a book on Kali Linux titled "Kali Linux - An Ethical Hacker's Cookbook"


Register Now!
$1499.99



For more information:
info@hackmiami.org
www.hackmiami.com