Challenge yourself to demonstrate creative problem solving and lateral thinking with 8 hours of grueling training on the latest cyber attack vectors used by Info-sec professionals. During the workshop, the audience will gain insight into detecting, analyzing and bypassing firewall security controls. In addition the audience will engage in compromising a system across the firewall and pivoting from an already compromised machine into the internal LAN.
- Exploitation with The Metasploit Framework
- Service-Side and Client-Side Exploitation Techniques
- Netcat for the Pentester
- Traffic redirection and Tunneling Techniques
- Network Scanning
- Windows Command line Kung-FU
- Obtaining and Passing Password Representations
The primary objective of the workshop is to provide an introduction for those interested in the offensive security arena. A live hacking lab engagement is part of the workshop, therefore you will need to bring a laptop and be ready to install open source security tools to practice the concepts in a controlled, safe and legal environment.
Send $95 to [masked] before RSVPing.
Preparation for Workshop
Enyel S Perez