Hacking Classes 75% 75% Hands-on Learning in Our Modern Hack Lab. Written by BlackHat Trainers: Available Globally
|
|
|
- Dominick Carson
- 9 years ago
- Views:
Transcription
1 75% 75% Hands-on Learning in Our Modern Hack Lab Updated Regularly to Include Trending Techniques Written by BlackHat Trainers: Available Globally Hacking Classes
2 Hacking Classes FOUNDATION TRACK FOUNDATION TRACK = + THE ART OF HACKING... PAGE 4 INFRASTRUCTURE HACKING... PAGE 5 WEB HACKING... PAGE 6 ADVANCED TRACK ADVANCED INFRASTRUCTURE HACKING... PAGE 8 ADVANCED WEB HACKING... PAGE 9 SPECIALIST TRACK APPSEC FOR DEVELOPERS...PAGE 11 ADVANCED MOBILE EXPLOITATION...PAGE 12 SPECIALIST PLUS OFFENSIVE IOT EXPLOITATION...PAGE 15 XTREME EXPLOITATION...PAGE 17 POWERSHELL FOR PEN TESTERS FOUNDATION...PAGE 18 INTERMEDIATE...PAGE 19 ADVANCED...PAGE Global Services Limited, 2016 All Rights Reserved NotSoSecure Global Services Limited (Company Registration , VAT Registration ) Trading As NotSoSecure Head Office: CB1 Business Centre, Twenty Station Road, Cambridge, CB1 2JD, UK Registered Office: Office 75 Springfield Road, Chelmsford, Essex, CM2 6JB, UK [email protected] Tel:
3 FOUNDATION TRACK
4 4 The Art of Hacking 5 DAY CLASS FOUNDATION TRACK The ideal introductory / intermediate training that brings together both Infrastructure Hacking and Web Hacking into a 5-day Art of Hacking class designed to teach the fundamentals of what Pen Testing is all about. This exciting training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focusses on what is really needed when conducting a Penetration Test. Whilst a variety of tools are used, they are the key tools that should be in any Penetration Tester s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career. WHO SHOULD TAKE THIS CLASS? System Administrators, Web Developers, SOC analysts, Penetration Testers, network engineers, security enthusiasts and anyone who wants to take their skills to the next level. Combination introduction to both infrastructure and web hacking Practical, hands-on hack-lab puts you in the driving seat Experience the journey of assessing web applications and the platforms they reside on Leave the class knowing the essential tools and techniques to continue your own journey This class teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems, networking devices and web application components. The class starts from the very basic, and builds up to the level where attendees can not only use the tools and techniques to hack various components involved in infrastructure and web hacking, but also walk away with a solid understanding of the concepts on which these tools are based. The class comprises of 3 days of infrastructure hacking and 2 days of web hacking. DAY 1 DAY 2 DAY 3 DAY 4 DAY 5 Infrastructure Basics TCP/IP Basics The Art of Port Scanning Target Enumeration Brute-Forcing Metasploit Basics Password Cracking Hacking Unix, Databases and Applications Hacking Recent Unix Vulnerabilities Hacking Databases Hacking Application Servers Hacking third party applications (WordPress, Joomla, Drupal) Hacking Windows Windows Enumeration Hacking recent Windows Vulnerabilities. Hacking Third party software (Browser, PDF, Java) Post Exploitation: Dumping Secrets Hacking Windows Domains Information Gathering, Profiling and Cross-Site Scripting Understanding HTTP protocol Identifying the Attack Surface Username Enumeration Information Disclosure Issues with SSL/TLS Cross Site Scripting Cross-Site Request Forgery Injection, Flaws, Files and Hacks SQL Injection XXE Attacks OS Code Injection Local/Remote File include Cryptographic weakness Business Logic Flaws Insecure File Uploads
5 5 Infrastructure Hacking 3 DAY CLASS FOUNDATION TRACK This is an entry-level Infrastructure Security and testing class and is a recommended pre-requisite for our Advanced Infrastructure Hacking class. This class familiarises the attendees with the basics of network hacking. A number of tools and techniques will be taught during this 3-day class, If you would like to step into the world of Ethical Hacking / Pen Testing this is the right class for you. WHO SHOULD TAKE THIS CLASS? System Administrators, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to the next level. Introduction into Infrastructure Testing Gain practical experience with the tools that will last you well into the future Learn core Infrastructure techniques Leave with the basis to take your testing knowledge forward into more Advanced Infrastructure topics This class familiarises the attendees with a wealth of hacking tools and techniques. The class starts from the very basic and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on which these tools work. DAY 1 Infrastructure Basics TCP/IP Basics The Art of Port Scanning Target Enumeration Brute-Forcing Metasploit Basics Password Cracking DAY 2 Hacking Unix, Databases and Applications Hacking Recent Unix Vulnerabilities Hacking Databases Hacking Application Servers Hacking Third Party Applications (WordPress, Joomla, Drupal) DAY3 Hacking Windows Windows Enumeration Hacking Recent Windows Vulnerabilities. Hacking Third Party Software (Browser, PDF, Java) Post Exploitation: Dumping Secrets Hacking Windows Domains
6 6 Web Hacking 2 DAY CLASS FOUNDATION TRACK Introduction into Web Application hacking Practical in focus, teaching how web application security flaws are discovered Covers leading industry standards and approaches Builds the foundation to progress your knowledge and move into more advanced Web Application topics This is an entry-level web Application Security-testing class and is a recommended pre-requisite for our Advanced Web Hacking class. This class familiarises the attendees with the basics of Web and Application hacking. A number of tools and techniques will be taught during the 2 day class. If you would like to step into the world of ethical hacking / pen testing with a focus on web applications, then this is the right class for you. This class familiarises the attendees with a wealth of tools and techniques needed to breach the security of web applications. The class starts from the very basic, and gradually builds up to a level where attendees can not only use the tools and techniques to hack various components involved in Web Application hacking, but also walk away with a solid understanding of the concepts on which these tools are based. The class also covers the industry standards such as OWASP Top 10, PCI DSS and contains numerous real life examples to help the attendees understand the true impact of these vulnerabilities. WHO SHOULD TAKE THIS CLASS? System Administrators, Web Developers, SOC analysts, Penetration Testers, network engineers, security enthusiasts and anyone who wants to take their skills to the next level. DAY 1 Information Gathering, Profiling and Cross-Site Scripting Understanding HTTP Protocol Identifying the Attack Surface Username Enumeration Information Disclosure Issues with SSL/TLS Cross-Site Scripting Cross-Site Request Forgery DAY 2 Injection, Flaws, Files and Hacks SQL Injection XXE Attacks OS Code Injection Local/Remote File Include Cryptographic Weakness Business Logic Flaws Insecure File Uploads
7 ADVANCED TRACK
8 8 Advanced Infrastructure Hacking 5 DAY CLASS ADVANCED TRACK Launched at BlackHat USA Latest exploits, highly relevant, continuously developed. 5-day practical class, teaching a wide variety of offensive hacking techniques. Written by real Pen Testers with a world conference reputation (BlackHat, AppSec, OWASP, Defcon et al). An Advanced Infrastructure Hacking class, released at BlackHat, designed for those who wish to push their knowledge The fast-paced class teaches the audience a wealth of hacking techniques to compromise various operating systems and networking devices. The class will cover advanced penetration techniques to achieve exploitation and will familiarise you with a wealth of hacking techniques for common operating systems, networking devices and much more. From hacking Domain Controllers with MS to GHOST local root, VLAN Hopping to VoIP Hacking, you have got everything covered. WHO SHOULD TAKE THIS CLASS? The class is ideal for those preparing for CREST CCT (ICE), CHECK (CTL), TIGER SST and other similar industry certifications, as well as those who perform Penetration Testing on infrastructure as a day job and wish to add to their existing skillset. Whether you are Penetration Testing, Red Teaming, or hoping to gain a better understanding of managing vulnerabilities in your environment, understanding advanced hacking techniques for infrastructure devices and systems is critical. The Advanced Infrastructure class will get the attendees familiarised with a wealth of hacking techniques for common Operating Systems and networking devices. While prior Pen Testing experience is not a strict requirement, a prior use of common hacking tools such as Metasploit is recommended for this class. DAY 1 Hacking Networks, Databases TCP/IP & Network Enumeration Port Scanning TCP/UDP Scanning Windows/Linux Enumeration The Art of Brute-Forcing Insecure SNMP Configuration Database Exploitation (Oracle, Postgres, Mysql) Hacking Application servers (Websphere) Exploiting SSL Vulnerabilities such as Heartbleed Exploiting Remote Systems via Shellshock Exploiting Java and PHP Serialization Bugs DAY 2 Advanced Windows Hacking Windows Vulnerabilities Mastering Metasploit Latest Remote Exploits Pivoting within Internal Network Local Privilege Escalation Custom Payloads Post-Exploitation DAY 3 Hacking Windows Domains Compromising Windows Domain Pass the hash Pass the ticket Breaking Kerberos Third party exploits (browser, java, pdf) DAY 4 Advanced Linux Hacking Linux Vulnerabilities Finger Rservices NFS Hacks SSH Hacks X11 Vulnerabilities Local Privilege Escalation Kernel Exploits Weak File Permissions SUID/SGID Scripts Inetd Services DAY 5 Hacking VLANs, VoIP, Switches & Routers VLAN Hopping Hacking VoIP Exploiting Insecure VPN Configuration Switch/Router vulnerabilities
9 9 Advanced Web Hacking 3 DAY CLASS ADVANCED TRACK This class familiarises the attendees with a wealth of advanced web hacking techniques. Besides covering advanced techniques in common web application flaws (such as those covered under OWASP Top 10), the class also covers some neat, new and ridiculous hacks. From mind bending XSS, to 2nd order SQL Injection; Breaking crypto to finding flaws in SAML/SSO and APIs we have got it all covered. The class has recently been updated to contain all current topics and modern technology. The class is ideal for candidates preparing for CREST ACE cerification. WHO SHOULD TAKE THIS CLASS? System Administrators, SOC analysts, Penetration testers, network engineers, security enthusiasts and anyone who wants to take their skills to next level. Advanced Web Hacking in a practical Hack Lab environment Gain in-depth expertise with the tools and techniques that will last you well into the future Learn core web hacking techniques This class familiarises the attendees with a wealth of advanced web hacking techniques. Besides covering advanced techniques in common web application flaws (such as those covered under OWASP Top 10), the class also covers some neat, new and ridiculous hacks. From mind bending XSS, to 2nd order SQL Injection; Breaking crypto to finding flaws in SAML/ SSO we have got it all covered. The class has recently been updated to contain all current topics and modern technology. The lab for the class is designed based on real life applications in which similar vulnerabilities have been found in past. For every vulnerability, in-depth solutions and mitigation strategies are also discussed. DAY 1 Hacking and Securing web and application servers Attacking Authentication Advanced Username Enumeration/ Brute Force Issues Exploiting SSO Session Management Issues Business Logic Bypass Authorization Issues DAY 2 Parameter Manipulation Attacks Cookie Analysis SSL Misconfiguration and Man in the Middle Attacks XSS: The Concept Same Origin Policy Identifying XSS Exploiting XSS Pitfalls in Defending XSS DAY3 Identifying Cross Site Request Forgery (CSRF) Exploiting CSRF Fixing CSRF Carriage Return & Line Feed (CRLF) injection Hacking APIs SQL Injection LDAP, XPATH, XXE Injections Insecure HTTP Methods Malicious File Uploads
10 SPECIALIST TRACK
11 11 AppSec for Developers 2 DAY CLASS SPECIALIST TRACK Pen Testing as an activity tends to capture security vulnerabilities at the end of the SDLC and is often too late to be able to influence fundamental changes in the way code is written. We wrote this class because of the need for developers to develop code and applications in a secure manner. It does not need to be more time consuming, but it is critical to introduce security as a quality component into the development cycle. The class does not target any particular web development platform, but does target the general insecure coding flaws developers make while developing applications. The examples used in the class include web development technologies such as ASP,.NET, JAVA and PHP. WHO SHOULD TAKE THIS CLASS? This training is Ideal for: Software/Web developers, PL/ SQL developers, Penetration Testers, Security Auditors, Administrators and DBAs and Security Managers. Covers latest industry standards such as OWASP Top 10 Insight into latest security vulnerabilities (such as mass assignment bug in MVC Frameworks) Thorough guidance on security best practices (like HTTP header such as CSP, HSTS header etc.) References to real world analogy for each vulnerability Hands-on labs A highly-practical class that targets web developers, pen testers, and anyone else who would like to learn about writing secure code, or to audit code against security flaws. The class covers a variety of best security practices and defense in-depth approaches, which developers should be aware of while developing applications. Students will be provided access to infrastructure on which they will identify vulnerable code and associated remediation. While the class covers industry standards such as OWASP Top 10 and SANS top 25 security issues, it also talks about real world issues that don t find a mention in these lists. The class does not focus on any particular web development language / technology but instead on the core principles. Examples include PHP,.NET, classic ASP and Java.10 and SANS top 25 security issues. DAY 1 DAY 2 Authorisation Session Management Logical Flaws Web Server Misconfiguration Application Server Misconfiguration HTTP Methods SSL and MITM attacks Cross Site Issues Cross Site Scripting Cross Site Request Forgery Session Fixation CRLF Injection Flash and Cross Domain Issues Server Side Issues SQL Injection File Uploads Server Side Includes File Inclusion Direct Object Reference OS Code Execution Best Security practice HSTS Content Security Policy Defence in Depth
12 12 Advanced Mobile Exploitation 3 DAY CLASS SPECIALIST TRACK A 3-day Advanced Mobile Exploitation class, focusing on Android and ios exploitation. If you want to try exploitation on new hardware and find security vulnerabilities, and 0-days in IoT devices, then Offensive IoT Exploitation is the class for you. At the end of the class, there will be a final CTF challenge where the attendees will have to identify security vulnerabilities and exploit them, in a completely unknown device. WHO SHOULD TAKE THIS CLASS? The only requirement for this class is that you bring your own laptop and have admin/root access. During the class, we will give you VPN access to our state-of-the-art hacklab which is hosted in our datacentre in the UK. Once you are connected to the lab, you will find all the relevant tools/vms there. We also provide a dedicated Kali VM to each attendee on the hacklab, so you don t need to bring any VMs with you. all you need is to install the VPN client and you are good to go! Also, note that we will use an Ethernet/Wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network. All about Android and ios exploitation Practical in focus, giving you the tools to understand platform security for the most common mobile OS types Packed with tools, techniques, approaches and key security principles Very in-depth, focused approach relevant to any professional engaged with this most complex and rapidly growing field of security Advanced Android and ios Exploitation: This fast-paced training will familiarise you with the various Android and ios exploitation techniques, as well as bypassing most of the existing security models in both of the platforms. We will cover topics such as writing your own malware, auditing complicated and protected applications, automated static and dynamic analysis, Dex Exploitation, ARM, OWASP Mobile, Top 10 and a lot more. Platform Exploitation on which most of the smartphone run these days. In ARM, we will cover exploitation techniques such as Stack Based Buffer Overflows, Gadget Chaining, ROP and Bypassing protections. Finally, for ios, we will be looking into the application security auditing, creating a pen test environment, presenting a sandboxing model, code signing, inspecting binaries, use-after-free and much more. We will also be looking into Android rooting and ios jail breaking exploits, and recreate the scenario from scratch. Students will also be provided with custom exploitation labs, which will be preconfigured and loaded with all the tools and scripts which will be covered during the training.
13 DAY 1 DAY 2 DAY 3 Android Basics Introduction to Android Android Architecture Digging into Android kernel Android Security Model Android Security Architecture Android Permission model Application Sandboxing Bypassing Android Permissions Android Application Components Android Debug Bridge Creating a Simple Android Application Setting up the Environment Setting up Android Emulator Setting up a Mobile Pentest Environment Dex Labs Introduction to Dalvik File Format In-depth to Smali Manipulating smali files and cracking Applications Cracking Application Licenses Dex file manipulation Obfuscating applications with dex obfuscator App Kung-fu Application Analysis Reverse Engineering Traffic Interception (Active and Passive) of Android Applications OWASP Top 10 for Android Sniffing Application and phone s network data Unsecure file storage Having fun with databases Exploiting Logic and Code flaws in applications Exploiting Content Providers SQL Injection in Android Application Local File Inclusion/Directory Traversal Drive by Exploitation Tapjacking HTML 5 Attacks Phishing Attacks on Android Exploitation with Drozer Drozer 101 Exploiting Content Provider vulnerabilities with Drozer Drozer Scripting Exploiting permission protected apps with Drozer Android Forensics & Malware Analysis Extracting text messages, voice mails, call logs, contacts and messages Recovering information stored in SD Card Reversing and Analysing Android malwares using Apktool, dex2jar and JD-GUI Introduction to IDA Pro Analysing malwares and exploits using IDA Introduction to ARM Exploitation Introduction to ARM Instruction set and Registers Debugging with GDB Stack Overflows on ARM Format String vulnerabilities Ret2ZP Attack and ROP Shellcoding on ARM Exploit Mitigations and Bypasses ARM Based rootkits Further Exploitation Creating custom Bootloaders Android Root Exploits Recreating the exploit Fuzzing Android components Webkit Exploitation Use After Free vulnerability and exploitation Writing a reliable exploit for Android More ROP Exploitation Finding ROP gadgets and building ROP Chains Using GDB for Android debugging Information Leaks in Android Being Secure Android in the Enterprise Writing Secure Code Pen test before you publish Writing Python Scripts for automating android pen tests Source Code Auditing for Applications ios Background Understanding ios Architecture ios Security Features ios Application Overview ios Security Model Code Signing Sandboxing Exploit Mitigation Encryption Setting up the Environment Setting up XCode Setting up iphone/simulator ios Hello-World ios Application components Introduction to Objective C Writing a simple Hello World application in your own idevice/simulator ios App Analysis Reverse Engineering ios Apps Decrypting Appstore Binaries Locating PIE (Position Independent Executable) Inspecting Binary Manipulating Runtime Auditing Insecure API Evaluating the Transport Security Abusing Protocol Handlers Insecure Data Storage Attacking ios keychain App Assessments Setting up pen testing environment for assessment Passive app assessment Active app assessment Application analysis App Kungfu Exploiting XSS in Apps (UIWebViews) Attacking XML processor SQL Injection Filesystem Interaction Geolocation Logging Background-ing Memory Corruption Issues Format strings Object use-after free ROP for ios Exploit Mitigations in ios ios Forensics Analysis of Backed up data in itunes Extracting SMS, Call Logs, etc., from an ios backup Imaging the whole device Being Secure ios App compliance checklist Writing Secure Codes Pen test your App before you publish
14 SPECIALIST PLUS
15 15 Offensive IoT Exploitation 2 DAY CLASS / 5 DAY BOOTCAMP SPECIALIST PLUS A series of 2-day practical classes or a 5-day boot camp, exploring the Internet of Things (IoT), playing with firmware, finding exploits in common devices and finding zero days. If you want to learn hands-on exploitation techniques on new hardware platforms and find security vulnerabilities in IoT devices, then offensive IoT Exploitation is the class for you. At the end of the class, there will be a final CTF challenge where the students will be asked to test their new knowledge, identify security vulnerabilities and exploit them in a completely unknown device. Offensive IoT Exploitation IoT or the Internet of Things is an upcoming trend in technology. Many new devices are coming up every single month, however very little attention has been paid to the device s security until now. Offensive IoT Exploitation is a brand new and unique class that offers pen testers and security researchers the ability to assess and exploit the security of these smart devices. The class will cover a variety of IoT devices, assessing their attack surfaces and writing exploits. The 2-day hands-on class series provides students with the ability to try things for themselves rather than just watching the slides. We will start from the very beginning discussing the architecture of IoT devices, and slowly moving to firmware analysis, identifying attack surfaces, finding vulnerabilities and finally, exploiting these vulnerabilities. A Challenging Series of Fast-Paced IoT Classes Taught By World-Leading IoT Experts who are BlackHat Lecturers Practical & Hands-On on Real Devices In-Depth Firmware, Chip & Device Focused Learn to Write Device-Level Exploits Uniquely tailored Ubuntu IoT exploit platform to take away Offensive IoT Exploitation comprises a brand new series of classes that offers pen testers and security researchers the ability to assess and exploit the security of these smart devices. The classes cover a variety of IoT devices, assessing their attack surfaces and writing exploits. The 2-day hands-on class series (beginner, intermediate and advanced) provide students with the knowledge to try things for themselves (rather than just watching the slides). We start from the very beginning discussing the architecture of IoT devices, and slowly move to firmware analysis, identifying attack surfaces, finding vulnerabilities and finally, exploiting these vulnerabilities. Uniquely, all classes end with a hour hardware CTF (Capture the Flag) event (foundation class CTF is a software challenge).
16 Foundation Intermediate Advanced This class is designed for anyone who wants to get started with the basics of Internet of Things Exploitation. This is the first level of our 3-part Offensive IoT Exploitation class series. During the class, attendees will be introduced to the tools and techniques that can be used to get started with IoT pen testing. This is a beginner friendly class and students don t need to have previous experience in IoT or penetration testing. During the 2-days, we will begin with the fundamentals and gradually move towards understanding firmware analysis, mobile app exploitation for IoT, hardware exploitation, wireless analysis and software defined radio. Getting Started With IoT Security Introduction to IoT Security Architecture Getting Familiar with IoT Security and Components Case Studies of IoT Vulnerabilities Attack Vectors for Smart Devices Conventional Attack Techniques IoT Device Attack Surface Mapping Information Gathering and Reconnaissance Mobile Based Exploitation Android Exploitation : Web / Network Services Insecure Encryption Components Password Cracking / Other Attacks Hardware Analysis and Exploitation Hardware Hacking 101 Analyzing Boards and Components Identifying Serial Interfaces / Pinouts UART Introduction and Interaction Serial to Root Radio Hacking Getting started with SDR Radio Interfaces and Architecture Commonly used IoT Communication Techniques Pen Test Lab for Radio Hacking Getting Familiar with GNURadio Capturing and Streaming Radio Recording and Replaying Radio Traffic This class is designed for individuals who already have a basic understanding of IoT and are familiar with penetration testing on various platforms. Offensive IoT Exploitation - Intermediate level will get you started with pen testing IoT devices in real world scenarios. During the class, you will work with various IoT devices - analysing, debugging and exploiting firmware, attacking radio communication protocols and performing hardware exploitation. This class will be valuable for security professionals entering the IoT space, and IoT developers looking to secure their products beter. Firmware Analysis Understanding Device File Systems Firmware Extraction Techniques Analyzing and Backdooring Firmware Emulating Firmwares and Binaries Remote Live Debugging Firmware Binaries Identifying Vulnerabilities in Firmware Software Exploitation Reversing Mobile Applications MIPS Assembly Basics Registers and Flags Disassembling and Debugging Binaries Common Exploitation Techniques Exploitation on MIPS Hardware Analysis and Exploitation Introduction to SPI Flash Dumping Firmware from a Real Device JTAG Introduction and Techniques Hardware Protection Side Channel Attacks Radio Hacking Introduction to Zigbee and ZWave Based Attacks Sniffing Bluetooth Low Energy (BLE) BLE Attack Vectors Other Communication Modes & Vulnerabilities The Advanced edition of Offensive IoT Exploitation is meant for individuals who already have experience with pen testing IoT devices, and want to take their skillsets to the next level. This class will help students use advanced techniques for various aspects such as Radio reversing, exploiting hardware serial interfaces and software RE. This will be a fast paced 2-day class covering topics ranging from JTAG to going in-depth with reversing Zigbee. The class is meant for security professionals, pen testers, reverse engineers and IoT professionals who want to break complex IoT devices or secure their products. Firmware Based Exploitation Advanced Firmware Analysis and Reversing Getting Around with Encrypted Firmware Firmware Dumping - via UART and JTAG Debug Firmware Exploitation - ROP, Command Injection Building Cross-toolchains Smart Device Hacking JTAG Enabling JTAG Exploitation Side Channel and Timing Based Attacks (Theory) Pulling Chips from the Device Automating Exploitation with Custom Hardware Devices USB Based Attack Vectors Fuzzing IoT Devices Industrial Grade IoT Ecosystem Hacking IoT With SDR Mapping out IoT Devices Based on Radio Signals Reversing Radio Communication Protocols for an IoT Device Injecting Wireless Packets Versions and Security Issues Zigbee Exploitation Automotive Exploitation 5 Day Bootcamp Designed as an end-to-end class, our 5-day IoT Boot Camp immerses our students in a week of intense knowledge acquisition, integrating and compressing the beginner, intermediate and advanced classes into one overall IoT learning experience. Designed for those who wish to drive their knowledge rapidly in the fascinating and very real world of IoT.
17 17 Xtreme Exploitation 2 DAY CLASS SPECIALIST PLUS What to expect Two days of debugging & disassembling Only place where pointers are not the ideal ones Calc.exe popping up everywhere! What not to expect Anything not related to Exploit Development Theory and Slides! Upon completion of this class, participants will be able to: Understand how exploits works and different types of software exploitation techniques Understand the exploit development process Search for vulnerabilities in closed-source applications Write their own exploits for vulnerable applications WHO SHOULD TAKE THIS CLASS? The class is focused on a comprehensive coverage of software exploitation. It will present different domains of code exploitation and how they can be used together to test the security of an application. The participants will learn about different types and techniques of exploitation, using debuggers to create their own exploits, understand protection mechanism of the Operating Systems and how to bypass them. The class is heavily focused on being hands-on. Reference material documents will be provided for concepts for further reading. This class is all hands on, from the word Go! Only code and exploitation techniques are what you will take home. Information Security Professionals Anyone with an interest in understanding exploit development Ethical Hackers and Penetration Testers looking to upgrade their skill-set to the next level DAY 1 Basic, yet effectively fuzzing Microsoft Excel 2007 (XLS) Identifying the vulnerability Controlling registers and program flow Popping up calc! DAY 2 Understanding Heap Spraying Exploiting a Use-After-Free in Internet Explorer 6 Exploiting a Heap Overflow in Adobe Reader 8 Exploiting Adobe Reader on Windows 7 using ROP chains Understanding ASLR bypasses
18 18 Powershell for Penetration Testers FOUNDATION / INTERMEDIATE / ADVANCED SPECIALIST PLUS PowerShell has changed the way Windows networks are attacked. It is Microsoft s shell and scripting language available by default in all modern Windows computers. It could interact with.net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell. This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests and Red Team engagements for highly secured environments. Attendees will get free one month access to a complete Active Directory environment after the training. In-memory shellcode execution using client side attacks. Exploiting SQL Servers (Command Execution, trust abuse, lateral movement.) Using Metasploit payloads with no detection Active Directory trust mapping, abuse and Kerberos attacks. Windows / Web passwords, Wireless keys, LSA Secrets / other system secrets Shell access and exfiltration: DNS, HTTPS, Gmail etc. Network relays, port forwarding and pivots to other machines. Reboot and Event persistence Bypass security controls like Firewalls, HIPS and Anti-Virus. Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch a disk, throw executables and use memory corruption exploits without the risk of being ineffective as a simulated adversary. PowerShell is the tool of choice to enhance offensive tactics and methodologies. Day 1 PowerShell Essentials and Getting a foothold Introduction to PowerShell Language Essentials Using ISE Help system Syntax of cmdlets and other commands Variables, Operators, Types, Output Formatting Conditional and Loop Statements Functions Modules PowerShell Remoting and Jobs Writing simple PowerShell scripts Extending PowerShell with.net WMI with PowerShell Playing with the Windows Registry COM Objects with PowerShell Recon, Information Gathering and the likes Vulnerability Scanning and Analysis Exploitation Getting a foothold Exploiting MSSQL Servers Client Side Attacks with PowerShell PowerShell with Human Interface Devices Using Metasploit and PowerShell together Day 2 Post Exploitation and Lateral Movement Post-Exploitation What PowerShell is actually made for Enumeration and Information Gathering Privilege Escalation Dumping System and Domain Secrets Kerberos attacks (Golden, Silver Tickets and more) Backdoors and Command and Control Pivoting to other machines Poshing the hashestm Replaying credentials Network Relays and Port Forwarding Achieving Persistence Detecting and stopping PowerShell attacks Quick System Audits with PowerShell Security controls available with PowerShell
19 19 Powershell for Penetration Testers FOUNDATION / INTERMEDIATE / ADVANCED SPECIALIST PLUS PowerShell has changed the way Windows networks are attacked. It is Microsoft s shell and scripting language available by default in all modern Windows computers. It could interact with.net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell. This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests and Red Team engagements for highly secured environments. Attendees will get free one month access to a complete Active Directory environment after the training. In-memory shellcode execution using client side attacks. Exploiting SQL Servers (Command Execution, trust abuse, lateral movement.) Using Metasploit payloads with no detection Active Directory trust mapping, abuse and Kerberos attacks. Windows / Web passwords, Wireless keys, LSA Secrets / other system secrets Shell access and exfiltration: DNS, HTTPS, Gmail etc. Network relays, port forwarding and pivots to other machines. Reboot and Event persistence Bypass security controls like Firewalls, HIPS and Anti-Virus. Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch a disk, throw executables and use memory corruption exploits without the risk of being ineffective as a simulated adversary. PowerShell is the tool of choice to enhance offensive tactics and methodologies. Day 1 PowerShell Essentials Introduction to PowerShell Language Essentials Using ISE Help system Syntax of cmdlets and other commands Variables, Operators, Types, Output Formatting Conditional and Loop Statements Functions Modules PowerShell Remoting and Jobs Writing simple PowerShell scripts Extending PowerShell with.net Accessing Windows API WMI with PowerShell Playing with the Windows Registry COM Objects with PowerShell Day 2 Getting a foothold Recon, Information Gathering and the likes Vulnerability Scanning and Analysis Exploitation Getting a foothold Exploiting MSSQL Servers Client Side Attacks with PowerShell PowerShell with Human Interface Devices Writing shells in PowerShell Using Metasploit and PowerShell together Porting Exploits to PowerShell Day 3 Post Exploitation and Lateral Movement Post-Exploitation What PowerShell is actually made for Enumeration and Information Gathering Privilege Escalation Dumping System and Domain Secrets Kerberos attacks (Golden, Silver Tickets and more) Backdoors and Command and Control Abusing SQL Server Trusts Pivoting to other machines Poshing the hashestm Replaying credentials Network Relays and Port Forwarding Day 4 Persistence, Defenses and Bypass Achieving Persistence Clearing Tracks Bypass Basic Defenses Detecting and stopping PowerShell attacks Bypass Advanced Defenses Quick System Audits with PowerShell Security controls available with PowerShell
20 20 Powershell for Penetration Testers FOUNDATION / INTERMEDIATE / ADVANCED SPECIALIST PLUS PowerShell has changed the way Windows networks are attacked. It is Microsoft s shell and scripting language available by default in all modern Windows computers. It could interact with.net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell. This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests and Red Team engagements for highly secured environments. Attendees will get free one month access to a complete Active Directory environment after the training. In-memory shellcode execution using client side attacks. Exploiting SQL Servers (Command Execution, trust abuse, lateral movement.) Using Metasploit payloads with no detection Active Directory trust mapping, abuse and Kerberos attacks. Windows / Web passwords, Wireless keys, LSA Secrets / other system secrets Shell access and exfiltration: DNS, HTTPS, Gmail etc. Network relays, port forwarding and pivots to other machines. Reboot and Event persistence Bypass security controls like Firewalls, HIPS and Anti-Virus. Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch a disk, throw executables and use memory corruption exploits without the risk of being ineffective as a simulated adversary. PowerShell is the tool of choice to enhance offensive tactics and methodologies. Day1 PowerShell Essentials Introduction to PowerShell Language Essentials Using ISE Help system Syntax of cmdlets and other commands Variables, Operators, Types, Output Formatting Conditional and Loop Statements Functions Modules PowerShell Remoting and Jobs Writing simple PowerShell scripts Extending PowerShell with.net Accessing Windows API WMI with PowerShell Playing with the Windows Registry COM Objects with PowerShell Day 2 Getting a foothold Recon, Information Gathering and the likes Vulnerability Scanning and Analysis Exploitation Getting a foothold Exploiting MSSQL Servers Client Side Attacks with PowerShell PowerShell with Human Interface Devices Writing shells in PowerShell Using Metasploit and PowerShell together Porting Exploits to PowerShell Day 3 Post Exploitation and Lateral Movement Post-Exploitation What PowerShell is actually made for Enumeration and Information Gathering Privilege Escalation Dumping System and Domain Secrets Kerberos attacks (Golden, Silver Tickets and more) Day 4 Post Exploitation and Persistence Post-Exploitation What PowerShell is actually made for Backdoors and Command and Control Abusing SQL Server Trusts Pivoting to other machines Poshing the hashestm Replaying credentials Network Relays and Port Forwarding Persistence Achieving Persistence Clearing Tracks Day 5 Defenses and Bypass Bypass Basic Defenses Detecting and stopping PowerShell attacks Bypass Advanced Defenses Quick System Audits with PowerShell Security controls available with PowerShell
21 @NotSoSecure Global Services Limited, 2016 NotSoSecure Global Services Limited (Company Registration , VAT Registration ) Trading As NotSoSecure Head Office: CB1 Business Centre, Twenty Station Road, Cambridge, CB1 2JD, UK Registered Office: Office 75 Springfield Road, Chelmsford, Essex, CM2 6JB, UK Tel:
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
PowerShell for Penetration Testers
Training: PowerShell for Penetration Testers Dates of the training: March 14-15,2016 in Heidelberg, Germany Book Now using the code: TR16HMTRAINING and save an additional 10% of the current valid rate!
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
2016 TÜBİTAK BİLGEM Cyber Security Institute
2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Audience. Pre-Requisites
T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
INFORMATION SECURITY TRAINING CATALOG (2016)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
Mobile Application Security and Penetration Testing Syllabus
Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Blackbox Android. Breaking Enterprise Class Applications and Secure Containers. Marc Blanchou Mathew Solnik 10/13/2011. https://www.isecpartners.
Blackbox Android Breaking Enterprise Class Applications and Secure Containers Marc Blanchou Mathew Solnik 10/13/2011 https://www.isecpartners.com Agenda Background Enterprise Class Applications Threats
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
