{"id":75,"date":"2018-06-02T13:06:15","date_gmt":"2018-06-02T13:06:15","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=75"},"modified":"2019-09-18T12:54:17","modified_gmt":"2019-09-18T10:54:17","slug":"brucon-2019-training","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/","title":{"rendered":"BruCON 2019 Training"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<div class=\"gem-textbox \"  ><div class=\"gem-textbox-inner\" style=\"\"><div class=\"gem-textbox-content\" style=\"background-color: #f4f6f7;background-image: url(https:\/\/archive.brucon.org\/2019\/wp-content\/uploads\/sites\/18\/2018\/06\/training_1.jpg);background-position: center top;\"><div class=\"gem-alert-box\"><div class=\"gem-alert-inner\"><div class=\"gem-alert-box-picture\"><div class=\"gem-icon gem-icon-pack-material gem-icon-size-small  gem-icon-shape-square gem-simple-icon\"  style=\"opacity: 1;\"><div class=\"gem-icon-inner\" style=\"\"><span class=\"gem-icon-half-1\" style=\"color: ;\"><span class=\"back-angle\">&#xf287;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"\"><span class=\"back-angle\">&#xf287;<\/span><\/span><\/div><\/div><\/div><div class=\"gem-alert-box-content\"><\/div><div class=\"gem-alert-box-buttons\"><style type=\"text\/css\">.thegem-button-69e8890413f659002 .gem-button svg {fill: #ffffff;}.thegem-button-69e8890413f659002 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69e8890413f659002    \"  ><a class=\"gem-button gem-button-size-large gem-button-style-outline gem-button-text-weight-normal gem-button-border-2\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;border-color: #ffffff;color: #ffffff;\" onmouseleave=\"this.style.borderColor='#ffffff';this.style.backgroundColor='transparent';this.style.color='#ffffff';\" onmouseenter=\"this.style.borderColor='#b43836';this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" href=\"#spring-training\" target=\"_self\">Spring Training<\/a><\/div> <style type=\"text\/css\">.thegem-button-69e8890413fc55869 .gem-button svg {fill: #ffffff;}.thegem-button-69e8890413fc55869 .gem-button:hover svg {fill: #b43836;}<\/style><div class=\"gem-button-container gem-button-position-center thegem-button-69e8890413fc55869    \"  ><a class=\"gem-button gem-button-size-large gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ffffff';this.style.color='#b43836';\" href=\"#conference-training\" target=\"_self\">Conference Training<\/a><\/div> <\/div><\/div><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Conference training&#8221; color=&#8221;danger&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-university&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23conference-training|||&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Spring Training&#8221; color=&#8221;inverse&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-graduation-cap&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23spring-training|||&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1545209374682{padding-top: 50px !important;}&#8221;][vc_column][vc_column_text]Immerse yourself into the world of security by attending the BruCON Training !\u00a0BruCON offers world-class, deep-technical training given by the most recognised experts with huge industry experience in their domain. We want to offer courses for anybody interesting in security, ranging from novice to advanced and for red and blue teams ![\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1545209392402{padding-top: 50px !important;}&#8221; el_id=&#8221;conference-training&#8221;][vc_column][vc_separator][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Conference Training<\/h2>\n<p>[\/vc_column_text][vc_column_text]<b>Conference training\u00a0<\/b>is taking place between 7 and 9 October 2019 and takes place in both the Hotel Novotel Gent Centrum and\u00a0NH Gent Belfort. For our 11th edition, we are bringing you 11 courses to choice from ! We are looking forward to seeing you again at BruCON Training!<\/p>\n<p><strong>Unfortunately, all conference tickets are now sold out, so even when buying a training ticket, you will not be able to buy a conference ticket!<\/strong><\/p>\n<p><strong>REMARK :\u00a0<\/strong>As of this year, the two-day courses will start on Tuesday (instead of Monday) so you will not loose a day between training and conference.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Advanced&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong>\u00a0The Corelan \u201cADVANCED\u201d exploit development class is a fast-paced, mind-bending, hands-on course where you will learn advanced exploit development techniques from an experienced exploit developer. During this (typically 3 \u2018long\u2019 day) course, students will get the opportunity to learn how to write exploits that bypass modern memory protections for the Win32 platform, using Windows 7 and Windows 10 as the example platform, but using techniques that can be applied to other operating systems an applications. We will discuss differences between Windows 7 and Windows 10 and explore previously undocumented techniques to achieve important exploitation primitives in Windows 10.\u00a0 The trainer will share his \u201cnotes from the field\u201d and various tips &amp; tricks to become more effective at writing exploits.This is most certainly not an entry level course. In fact, this is one of the finest and most advanced courses you will find on Win32 exploit development.<\/p>\n<p><strong>REMARK :<\/strong> This training starts at 9:00 and will end around 22:00 PM. That means +10 hours each day (Dinner will be foreseen)<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong>\u00a03-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/corelan-advanced\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e889041463e8355 .gem-button svg {fill: #ffffff;}.thegem-button-69e889041463e8355 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e889041463e8355    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Advanced Windows Tradecraft&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:<\/strong> Organizations with a mature security model want to test their security controls against sophisticated adversaries. Red teams that want to simulate such adversaries need advanced Tradecraft. Such Tradecraft must include the ability to adapt to the target environment, modify existing tactics and techniques to avoid detection, swiftly switch between tools written in different languages supported on Windows, break out of restrictions, utilize functionality abuse and keep up with the game of bypassing countermeasures. If you want to take your Windows tradecraft to the next level then this is the course for you.<\/p>\n<p><strong>Instructor:<\/strong>\u00a0Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong>\u00a03-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/advanced-windows-tradecraft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904146b55701 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904146b55701 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904146b55701    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Malicious Documents for Red Teams&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:<\/strong> Malicious Office documents have been on the radar for several years now. Together with malicious PDF documents. But do you know how to create and tailor them efficiently to achieve successful read team engagements? This training will first teach you how to analyse MS Office files (both \u201cold\u201d OLE and \u201cnew\u201d XML formats) and PDF files, to better understand how to create them and evade detection. PDF files that execute code via exploits. MS Office documents that execute code via macros or exploits. Didier Stevens will teach you how to use his Python tools to analyse MS Office documents and PDF documents. Then we will move on to the creation of malicious documents.<\/p>\n<p><strong>Instructor:<\/strong> Didier Stevens<\/p>\n<p><strong>Duration:<\/strong> 3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/malicious-documents-for-red-teams\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e889041471e3667 .gem-button svg {fill: #ffffff;}.thegem-button-69e889041471e3667 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e889041471e3667    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;A Practical Approach to Malware Analysis and Memory Forensics&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:<\/strong>\u00a0 This hands-on training teaches the concepts, tools, and techniques to analyze, investigate and hunt malware by combining two powerful techniques malware analysis and memory forensics. This course will introduce attendees to basics of malware analysis, reverse engineering, Windows internals and memory forensics, it then gradually progresses deep into more advanced concepts of malware analysis &amp; memory forensics.<\/p>\n<p><strong>Instructor:<\/strong> Monnappa K A<\/p>\n<p><strong>Duration:<\/strong> 3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/a-practical-approach-to-malware-analysis-and-memory-forensics\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904147746945 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904147746945 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904147746945    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Practical IoT Hacking&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcb&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>&#8220;The great power of Internet Of Things comes with the great responsibility of security&#8221;. Being the\u00a0hottest technology, the developments and innovations are happening at a stellar speed, but the\u00a0security of IoT is yet to catch up. Since the safety and security repercussions are serious and at\u00a0times life threatening, there is no way you can afford to neglect the security of IoT products.<\/p>\n<p>&#8220;Practical Internet of Things (IoT) Hacking\u201d is a unique course which offers security professionals,\u00a0a comprehensive understanding of the complete IoT Technology suite including, IoT protocols,\u00a0sensors, client side, mobile, cloud and their underlying weaknesses. The extensive hands-on labs\u00a0enable attendees to identify, exploit or fix vulnerabilities in IoT, not just on emulators but on real\u00a0\u00a0smart devices as well.<\/p>\n<p>The course focuses on the attack surface on current and evolving IoT technologies in various\u00a0domains such as home, enterprise Automation etc. It covers grounds-up on various IoT protocols\u00a0including internals, specific attack scenarios for individual protocols and open source\u00a0software\/hardware tools one needs to have in their IoT penetration testing arsenal. It also covers\u00a0hardware attack vectors and approaches to identify respective vulnerabilities . In addition to the\u00a0protocols and hardware it also focuses on reverse engineering mobile apps and native code to find\u00a0weaknesses.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Aseem Jakhar and Arun Magesh<\/p>\n<p><strong>Duration:<\/strong> 3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/practical-iot-hacking\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904147bd6872 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904147bd6872 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904147bd6872    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Assessing and Exploiting Control Systems &amp; IioT&#8221; tab_id=&#8221;1528018036023-50094a93-3fee&#8221;][vc_column_text]<strong>Description:<\/strong> This is not your traditional SCADA\/ICS\/IIoT security course! How many courses send you home with a $300 kit including your own PLC and a set of RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Justin Searle<\/p>\n<p><strong>Duration:<\/strong> 3-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/assessing-and-exploiting-control-systems-iiot\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904148046394 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904148046394 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904148046394    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;<del>Detection of In &amp; Out &#8211; Network Exfiltration and Post-Exploitation Techniques &#8211; BLUE EDITION<\/del> (CANCELLED)&#8221; tab_id=&#8221;1528018045811-e9d3b40f-5491&#8243;][vc_column_text]<strong>Description:\u00a0Unfortunately, this training has been cancelled due to low participant numbers<\/strong>\u00a0<del>The main goal of this training is to achieve better detection of post-exploitation activities and more effective incident handling, thus allowing to reduce the number of false positives in the SOC environment. Individual detection lab cases will be launched and analyzed together in details by finding new and using existing DFIR artifacts. A modular lab-oriented form of the training allows for a later use and combination within your own SOC infrastructure, expanding and delivering complex tactics, techniques and procedures (TTP).\u00a0Individual artifacts of \u201cRED\u201d actions will be linked, properly characterized, tagged and grouped taking into account the level of criticality, mapping to the MITRE ATT&amp;CK Framework and chain-linking events\/pieces of evidence that make up a given security incident.<\/del><\/p>\n<p><strong>Instructor:<\/strong>\u00a0<del>Leszek Mi\u015b<\/del><\/p>\n<p><strong>Duration:<\/strong> <del>3-day course<\/del><\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/detection-of-in-out-network-exfiltration-and-post-exploitation-techniques-blue-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904148497163 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904148497163 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904148497163    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;<del>Live Forensic Training<\/del> (CANCELLED)&#8221;\u00a0tab_id=&#8221;1528018100415-0281d92c-ced7&#8243;][vc_column_text]<strong>Description:<\/strong>\u00a0<strong>Unfortunately, this training has been cancelled due to low participant numbers<\/strong>. <del>The live forensic training will teach how to acquire and analyse data of a running machine (Windows, Linux and macOS) that would be lost upon shutdown. The training mainly focuses on memory (RAM), but also considers other data sources that have to be safeguarded carefully, such as active browser sessions and temporarily unlocked encryption. The training will teach you how to find evidence of malicious user activity as well as advanced malware in memory. The theory of the training will be put into practise by analysing memory images of a Windows, Linux and Mac computer that were involved in a scenario that was specifically created for this training. The scenario involves a hacking, criminal user activity, anti-forensic techniques and more. By analysing the artefacts and correlating the findings, you will unravel the complete story. All detailed course material (theory and step-by-step exercise solutions) will be yours to keep after the training. This will serve as excellent reference material during your investigations.<\/del><\/p>\n<p><strong>Instructor:\u00a0<\/strong><del>Dominique Pauwels and C\u00e9dric Remande<\/del><\/p>\n<p><strong>Duration:<\/strong>\u00a0<del>3-day course<\/del><\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/live-forensics-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e889041488e7432 .gem-button svg {fill: #ffffff;}.thegem-button-69e889041488e7432 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e889041488e7432    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking and Securing Cloud Infrastructure&#8221; tab_id=&#8221;1528018123324-cf58c810-21cb&#8221;][vc_column_text]<strong>Description:<\/strong> Brand new for 2019, this 2-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Anthony Webb<\/p>\n<p><strong>Duration:<\/strong>\u00a02-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/hacking-and-securing-cloud-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904148e87963 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904148e87963 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904148e87963    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;<del>Offensive Whiteboard Hacking for Penetration Testers<\/del> (CANCELLED)&#8221; tab_id=&#8221;1528018143442-eabfc38c-16a0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong><del>With this training we will teach you how to use threat modeling as an offensive weapon. Traditional threat modeling looks at the attacker, the asset and the system. With offensive threat modeling we look at the defender to understand his tactics and expose weaknesses. You will be challenged to perform practical threat modeling in groups of 3 to 4 people covering the different stages of offensive threat modeling on applications, IOT devices and a nuclear facility.<\/del><\/p>\n<p><strong>Instructor:<\/strong>\u00a0<del>Steven Wierckx<\/del><\/p>\n<p><strong>Duration:\u00a0<\/strong><del>2-day course<\/del><\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/offensive-whiteboard-hacking-for-penetration-testers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e889041492c8259 .gem-button svg {fill: #ffffff;}.thegem-button-69e889041492c8259 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e889041492c8259    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation&#8221; tab_id=&#8221;1528018123324-cf58c810-21bb&#8221;][vc_column_text]<strong>Description:<\/strong> HackerOne bug hunters have earned $20 million in bug bounties until 2017 and they are expected to earn $100 million by the end of 2020. Some of HackerOne customers include the United States Department of Defense, General Motors, Uber, Twitter, and Yahoo. It clearly shows where the challenges and opportunities are for you in the upcoming years. What you need is a solid technical training by one of the Top 10 HackerOne bug hunters.<\/p>\n<p>Modern web applications are complex and it\u2019s all about full-stack nowadays. That\u2019s why you need to dive into full-stack exploitation if you want to master web attacks and maximize your payouts. Say \u2018No\u2019 to classical web application hacking. Join this unique hands-on training and become a full-stack exploitation master.<\/p>\n<p><strong>Instructor:<\/strong>\u00a0Dawid Czagan<\/p>\n<p><strong>Duration:<\/strong>\u00a02-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2019\/brucon-2019-training\/bug-hunting-millionaire-mastering-web-attacks-with-full-stack-exploitation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69e88904149701040 .gem-button svg {fill: #ffffff;}.thegem-button-69e88904149701040 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69e88904149701040    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0b-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]At BruCON, we try to offer a qualitative line-up of courses, delivered by experts in their fields for an affordable price.In order to make sure it is interesting for the trainers, we jointly agree on a minimum amount of students. In case we have to cancel a course, we will inform you no later as one month before the training (thus September 7th for BruCON 0x0B). You will always have the option to go for a full refund, or to be moved to another course.<\/p>\n<p>Below you&#8217;ll find a list of all courses and whether this minimum has already been reached. This will be updated frequently.[\/vc_column_text][vc_raw_html]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[\/vc_raw_html][vc_column_text]Last update : 8th June 2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>Additional info<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_toggle title=&#8221;Pricing&#8221;]The price for 2-day courses is 1300 Euro early bird (+ VAT) per attendee.<br \/>\nThe price for 3-day courses is 1600 Euro early bird (+ VAT) per attendee.<\/p>\n<p><b>As of the 1st of July 2019<\/b>\u00a0this will become 1400 Euro (2-day) \/ 1700 Euro (3-day) (+ VAT) per attendee.<br \/>\n(*) The Corelan trainings are a little bit more expensive but consist of 3 long days (+ 10 hours) including dinner.<\/p>\n<p>(**) The\u00a0Assessing and Exploiting Control Systems &amp; IIoT training by Justin Searle is bit more expensive but comes with a full kit including your own PLC and RF hacking[\/vc_toggle][vc_toggle title=&#8221;Location and dates&#8221;]Courses are held at the\u00a0<b>Hotel Novotel Gent Centrum, Goudenleeuwplein 5<\/b>\u00a0(Conference and Spring Training) and\u00a0<b>NH Gent Belfort, Hoogpoort 63, B-9000 Ghent<\/b>. (Conference training) (Both hotels are within walking distance of each other (&lt;1 minute).<\/p>\n<p>The courses\u00a0<b>begin promptly at 09h00<\/b>\u00a0and\u00a0<b>end at 17h00<\/b>\u00a0(Except Corelan trainings). Out of consideration for your instructor(s) and fellow students, please try to be seated and ready to go by 08h45.<\/p>\n<p>Lunch is included in the training fee. During the registration you can specify a regular, vegetarian or vegan meal. We will do our best to accommodate according to your requirements.[\/vc_toggle][vc_toggle title=&#8221;Why attend a BruCON Training ?&#8221;]At BruCON, we try to keep our <strong>prices affordable<\/strong>, both for the conference and training. We focus on the having smaller classes with <strong>enough time to get to learn and exchange experience<\/strong>. We will host <strong>a social gathering for students, trainers and crew<\/strong> to meetup over a beer (or more) and you will receive <strong>a small gift<\/strong>[\/vc_toggle][vc_toggle title=&#8221;How to register a conference ticket after purchasing a training ticket ?&#8221;]After you have purchased a training ticket, you will receive a confirmation email from EventBrite. In this email, towards the bottom there will be an &#8220;Additional Information&#8221; section that looks as follows<\/p>\n<p><img class=\"alignnone size-medium wp-image-1929\" src=\"https:\/\/archive.brucon.org\/2019\/wp-content\/uploads\/sites\/18\/2019\/06\/Capture-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/archive.brucon.org\/2019\/wp-content\/uploads\/sites\/18\/2019\/06\/Capture-300x200.jpg 300w, https:\/\/archive.brucon.org\/2019\/wp-content\/uploads\/sites\/18\/2019\/06\/Capture.jpg 559w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>With this code, you can go to the conference registration page (<a href=\"https:\/\/brucon-0x0b.eventbrite.co.uk\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/brucon-0x0b.eventbrite.co.uk<\/a>), click on <strong>Tickets\u00a0<\/strong>and click on the link on the top right &#8220;<em>Enter Promotional Code<\/em>&#8220;. Once you have entered the code you have found in your confirmation email, you will be able to purchase a conference ticket.<\/p>\n<p><strong>Remark :\u00a0<\/strong>This code is <strong>only valid for 10 days after completing your course registration<\/strong> ! Registrations that were not completed on time, will be removed.[\/vc_toggle][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1545209299601{padding-top: 50px !important;}&#8221; el_id=&#8221;spring-training&#8221;][vc_column][vc_separator][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Spring Training<\/h2>\n<p>[\/vc_column_text][vc_column_text]BruCON #0X0B Spring Training is over. Thank you to everybody who attended this great edition![\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Conference training&#8221; color=&#8221;danger&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-university&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23conference-training|||&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Spring Training&#8221; color=&#8221;inverse&#8221; size=&#8221;lg&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;fa fa-graduation-cap&#8221; button_block=&#8221;true&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23spring-training|||&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1545209374682{padding-top: 50px !important;}&#8221;][vc_column][vc_column_text]Immerse yourself into the world of security by attending the BruCON Training !\u00a0BruCON offers world-class, deep-technical training given by the most recognised experts with huge industry experience in their domain. We want to offer courses for anybody interesting in security, ranging from novice to advanced and for red and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-75","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":65,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/75\/revisions"}],"predecessor-version":[{"id":2045,"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/pages\/75\/revisions\/2045"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2019\/wp-json\/wp\/v2\/media?parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}