{"id":812,"date":"2016-06-28T14:02:00","date_gmt":"2016-06-28T14:02:00","guid":{"rendered":""},"modified":"2018-06-20T00:37:32","modified_gmt":"2018-06-19T22:37:32","slug":"brucon-0x08-trainings-information","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2016\/06\/28\/brucon-0x08-trainings-information\/","title":{"rendered":"BruCON 0x08 Trainings information"},"content":{"rendered":"<p><span style=\"font-size: 13px;line-height: 20.8px\">We are proud to present to you our program for the 2016 BruCON 0x08 Training (24-26 October)<\/span><br \/>\n<span style=\"font-size: 13px;line-height: 20.8px\"><br \/>\n<\/span><span style=\"font-size: 13px;line-height: 20.8px\">The line-up! :\u00a0<\/span><\/p>\n<ul>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Offensive PowerShell for Red and Blue Teams by Nikhil Mittal\u00a0(3-day training)<\/b> &#8211; In this course, you&#8217;ll learn how to attack Windows network using PowerShell, based on real world penetration tests. The course runs on a lab network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations.<\/li>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Windows Kernel Exploitation by Ashfaq Ansari\u00a0(3-day training)<\/b> &#8211; In this 3-day training course, you&#8217;ll learn to fuzz Windows Kernel Mode driver and find vulnerabilities. You&#8217;ll be taken from basics of Windows Architecture, it&#8217;s Kernel and introduction to different software vulnerabilities along with their exploitation in Kernel mode. These 3 days will be full of hands-on, kernel debugging and WinDbg-Fu.<\/li>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Assessing and Exploiting Control Systems by Justin Searle (3-day training)<\/b> &#8211; This is not your traditional SCADA\/ICS\/IoT security course! How many courses send you home with your own PLC and a set of hardware\/RF hacking tools?!? In this 3-day version of the course, you will receive all six days worth of slides.<\/li>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Hacking web applications \u2013 case studies of award-winning bugs in Google, Yahoo, Mozilla and more by Dawid Czagan\u00a0(2-day training)<\/b> &#8211; Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds interesting, join this unique two-day hands-on training!<\/li>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Attacking with Excel by Didier Stevens\u00a0(2-day training)<\/b> &#8211; In this training, our resident trainer Didier will teach you how to use Microsoft Office for offensive security. Performing a port scan, injecting and execute shellcode or even loading your own DLL&#8217;s without touching the disk, only by using the Excel process\u00a0!<\/li>\n<li style=\"margin-bottom: 0.1em;margin-left: 0.5em;padding: 0px\"><b>Hardware hacking training with Hardsploit by Julien Moinard (2-day training)<\/b> &#8211; Tired of watching hardware products getting hacked every day without having your part of fun\u00a0? Don&#8217;t worry it will not be the case anymore! This training teaches you hardware hacking in its most pragmatic aspects by using both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a &#8220;Discover \/ Analyze \/ Attack &amp; Protect&#8221; guideline that can be applied to any kind of hardware product (Internet of Insecure Things included). Each student will receive a Hardsploit hardware hacking tool, with a value of 250 euros.<\/li>\n<\/ul>\n<p><u>Registrations will be opened on the 1st of July. Early-bird registration till the 1st of August!<\/u><br \/>\nThe training location will be\u00a0<a style=\"font-family: georgia, serif;font-size: 13px;line-height: 20.8px\" href=\"http:\/\/www.accorhotels.com\/gb\/hotel-0840-novotel-gent-centrum\/index.shtml\" target=\"_blank\" rel=\"noopener\">Novotel Ghent Centrum<\/a>.<br \/>\n<span style=\"font-size: 13px;line-height: 20.8px\"><br \/>\n<\/span><span style=\"font-size: 13px;line-height: 20.8px\">All training details and registration links can be found on the BruCON training pages (<a href=\"http:\/\/2016.brucon.org\/index.php\/Training\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">link<\/a>)<\/span><br \/>\n<span style=\"font-size: 13px;line-height: 20.8px\"><br \/>\n<\/span><span style=\"font-size: 13px;line-height: 20.8px\">your BruCON team.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are proud to present to you our program for the 2016 BruCON 0x08 Training (24-26 October) The line-up! :\u00a0 Offensive PowerShell for Red and Blue Teams by Nikhil Mittal\u00a0(3-day training) &#8211; In this course, you&#8217;ll learn how to attack Windows network using PowerShell, based on real world penetration tests. The course runs on a lab network to which attendees will have Free access for one month after the training. The class consists of hands-on,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-812","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":2,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/812\/revisions"}],"predecessor-version":[{"id":1453,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/812\/revisions\/1453"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}