Offensive Security 101

Women In Cybersecurity Community Association
Women In Cybersecurity Community Association
Public group
Location image of event venue


WICCA is giving a two-day training in Offensive Security especially for beginners. Securify is hosting us in their Sloterdijk office and will be providing lunch and Club Mate!
More on Securify:

The training will include:
- Basic infrastructure and web introduction
- Network vulnerability scanning
- Offensive Security tooling
- Web application pwnage
- OWASP Top 10
- Kernel exploits
- A tiny bit about malware reversing
- A Hackback CTF-like game
- Demos and more demos!

The training will have a mixed audience. We opened the registration early exclusively for women.

The trainer is Valentine, ethical hacker from the KPN REDteam. Andrea from Deloitte and Sanne from Fox-IT will assist with the training.

*** Planning ***
- 10:00 - 10:30: walk-in
- 10:30 - 12:30: training
- 12:30 - 13:30: lunch
- 13:30 - 15:00: training
- 15:00 - 17:00: lab
- 10:30 - 12:30: training
- 12:30 - 13:30: lunch
- 13:30 - 17:00: CTF time!

Keep in mind that this training is meant as an introduction to offensive security and is exclusively for beginners. If you are already an advanced hax0ress, you might get a bit bored :')

*** Prerequisites ***
- Bring a laptop!
- A Kali virtual machine (Virtual Box will do

There is some pre-knowledge required: some (web application) coding knowledge and being familiar with Unix terminology and command line usage.

Regarding web applications, which is a strong subject in this training, there are multiple web guides you can follow. This one is quite alright:

W3Schools also provide multiple tutorials regarding web applications:

This is so you get basic knowledge on web architectures, JavaScript and HTML, and also how to deal with databases (SQL language).

Regarding Linux knowledge and especially the use of the Unix terminal (Linux and MacOS) there is a cheat sheet for Unix commands:

And then, there is the concept of shells: secure shells and "getting a shell" on a system: and