{"id":451,"date":"2018-06-03T10:08:19","date_gmt":"2018-06-03T10:08:19","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=451"},"modified":"2018-06-08T17:10:59","modified_gmt":"2018-06-08T15:10:59","slug":"offensive-whiteboard-hacking-for-penetration-testers","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2018\/brucon-2018-training\/offensive-whiteboard-hacking-for-penetration-testers\/","title":{"rendered":"Offensive Whiteboard Hacking for Penetration Testers"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Course_Description\" class=\"mw-headline\">Course Description<\/span><\/h2>\n<div class=\"thumb tright\">\n<div class=\"thumbinner\">\n<div class=\"thumbcaption\">\n<div class=\"magnify\">\n<div>The training material and hands-on workshops with real live Use Cases are provided by Toreon. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of offensive threat modeling on:<\/div>\n<ul>\n<li>Attacking a hotel booking web and mobile application, sharing the same REST backend<\/li>\n<li>Weakness analysis of an Internet of Things (IoT) smart home deployment<\/li>\n<li>Get into the defenders head \u2013 modeling points of attack against a nuclear facility<\/li>\n<\/ul>\n<div>During the training many real life examples of attacks will be provided. Toreon has delivered threat modeling training courses at Black Hat, OWASP and O\u2019Reilly Security conferences.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Course_contents\" class=\"mw-headline\">Course contents<\/span><\/h2>\n<div>Threat modeling introduction<\/div>\n<ul>\n<li>Offensive threat modeling for penetration testers<\/li>\n<li>What is threat modeling?<\/li>\n<li>Why perform threat modeling?<\/li>\n<li>Threat modeling stages<\/li>\n<li>Diagrams<\/li>\n<li>Identify threats<\/li>\n<li>Addressing threats<\/li>\n<li>Exploiting a threat model<\/li>\n<\/ul>\n<div><\/div>\n<div>Diagrams \u2013 what are you attacking?<\/div>\n<ul>\n<li>Understanding context<\/li>\n<li>Doomsday scenarios<\/li>\n<li>Data flow diagrams<\/li>\n<li>Attack Boundaries<\/li>\n<li>Hands-on: Attacking a B2B web and mobile applications, sharing the same REST backend<\/li>\n<\/ul>\n<div><\/div>\n<div>Identifying threats \u2013 how can we attack?<\/div>\n<ul>\n<li>STRIDE introduction<\/li>\n<li>Spoofing threats<\/li>\n<li>Tampering threats<\/li>\n<li>Repudiation threats<\/li>\n<li>Information disclosure threats<\/li>\n<li>Denial of service threats<\/li>\n<li>Elevation of privilege threats<\/li>\n<li>Attack trees<\/li>\n<li>Hands-on: Weakness analysis of an Internet of Things (IoT) smart home deployment<\/li>\n<\/ul>\n<div><\/div>\n<div>Understanding defence<\/div>\n<ul>\n<li>Mitigation patterns<\/li>\n<li>Authentication: mitigating spoofing<\/li>\n<li>Integrity: mitigating tampering<\/li>\n<li>Non-repudiation: mitigating repudiation<\/li>\n<li>Confidentiality: mitigating information disclosure<\/li>\n<li>Availability: mitigating denial of service<\/li>\n<li>Authorization: mitigating elevation of privilege<\/li>\n<li>Hands-on: get into the defenders head \u2013 modeling points of attack of a nuclear facility.<\/li>\n<\/ul>\n<div><\/div>\n<div>Attack libraries<\/div>\n<ul>\n<li>Attack libraries<\/li>\n<li>CAPEC<\/li>\n<li>OWASP Top 10<\/li>\n<li>The \u201cSnowden\u201d documents<\/li>\n<li>Other lists<\/li>\n<li>Create your own attack list<\/li>\n<\/ul>\n<div>Penetration testing based on threat models<\/div>\n<ul>\n<li>Create pentest cases for threat mitigation features<\/li>\n<li>Pentest planning to exploit security design flaws<\/li>\n<li>Vulnerabilities as input to plan and scope security testing<\/li>\n<li>Prioritization of pentesting based on risk rating<\/li>\n<li>Threat modeling resources<\/li>\n<li>Open-Source tools<\/li>\n<li>Commercial tools<\/li>\n<li>General tools<\/li>\n<\/ul>\n<div>Examination<\/div>\n<ul>\n<li>Hands-on examination<\/li>\n<li>Grading and certification<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Target_audience\" class=\"mw-headline\">Target audience<\/span><\/h2>\n<p>This training is aimed at security professionals or penetration testers.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Requirements\" class=\"mw-headline\">Requirements<\/span><\/h2>\n<p>Before attending this course, students should be familiar with basic knowledge of penetration testing methodologies and techniques.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Hardware.2Fsoftware_Requirements\" class=\"mw-headline\">Hardware\/Software Requirements<\/span><\/h2>\n<p>The students should bring their own laptop to the course.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Testimonials<\/h2>\n<div>Example feedback from our Black Hat 2017 training attendees:<\/div>\n<ul>\n<li>\u201cSebastien delivered! One of the best workshop instructor&#8217;s I&#8217;ve ever had.\u201d<\/li>\n<li>\u201cVery nice training course, one of the best I ever attended.\u201d<\/li>\n<li>\u201cI feel that this course is one of the most important courses to be taken by a security professional.\u201d<\/li>\n<li>\u201cThe group hands-on practical exercises truly helped.\u201d<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2><span id=\"Trainer_Biography\" class=\"mw-headline\">Trainer Biography<\/span><\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/6&#8243;][vc_column_text]<\/p>\n<div><strong>Sebastien Deleersnyder<\/strong> led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.<\/div>\n<div><\/div>\n<div>Linkedin : sebadele<\/div>\n<div>Twitter : sebadele<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;1400&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;5\/6&#8243;][vc_column_text]<strong>Steven Wierckx<\/strong> is a software and security tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development, and database design, Steven shares his passion for web application security through writing and training on testing software for security problems, secure coding, security awareness, security testing, and threat modeling. He is the project leader for the OWASP Threat Modeling Project and organizes the BruCON student CTF. Last year, he spoke at Hack in the Box Amsterdam, hosted a workshop at BruCON and delivered threat modeling trainings at OWASP AppSec USA and O\u2019Reilly Security New York.<\/p>\n<div>Linkedin : steven-wierckx<\/div>\n<div>Twitter : @ihackforfun<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;1401&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Course Description The training material and hands-on workshops with real live Use Cases are provided by Toreon. The students will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of offensive threat modeling on: Attacking a hotel booking web and mobile application, sharing the same REST backend Weakness analysis of an Internet of Things (IoT) smart home deployment Get into the defenders head \u2013 modeling&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":75,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-451","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=451"}],"version-history":[{"count":6,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/451\/revisions"}],"predecessor-version":[{"id":1402,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/451\/revisions\/1402"}],"up":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/pages\/75"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}