What we're about
Upcoming events (4+)
Pwncat (https://pwncat.readthedocs.io) is a command and control framework which turns a basic reverse or bind shell into a fully-featured exploitation platform. In this presentation, you'll learn how to use pwncat-cs and learn how to write your own modules to extent pwncat to run your own exploits, deliver implants, automate privilege escalation and execute custom code. By the end of the session you will have written your own custom module to do your own bidding.
This is a hands-on workshop, come prepared:
- Linux host (VM) with Python and pwncat-cs installed - see https://pwncat.readthedocs.io/en/latest/installation.html
- Free TryHackMe account - https://tryhackme.com/signup
About the speaker
Security Engineer | Security Researcher, Vulscan Digital Security
Dana has spent decades as a security architect that focuses on helping secure software, data, and infrastructure. You might say he's been on and led Blue and Red Teams well before it was even a thing. When he's not helping to build and grow software companies focused on developing security tools he's advising others on how to build and break their own applications and environments. As both a Microsoft Regional Director and Security MVP, he spends a great deal of time on security (de)engineering in the cloud.
Lately, he’s challenged himself to be more on Purple team, shifting more on his offensive tradecraft to help developers and IT administrators see the demonstrable impact of exploitation on vulnerabilities in their work. He is a director of OWASP Vancouver, and is the #1 ranked Canadian hacker on TryHackMe where he teaches others how to hack apps and infrastructure.