{"id":6,"date":"2018-06-02T12:02:36","date_gmt":"2018-06-02T12:02:36","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=6"},"modified":"2022-07-04T21:56:00","modified_gmt":"2022-07-04T19:56:00","slug":"tickets","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2022\/tickets\/","title":{"rendered":"Tickets"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Conference Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #b43836\">Ticket sale will start on June 1st 2022 at 5 PM CET.\u00a0<\/span><\/h5>\n<p>[\/vc_column_text][vc_column_text]<div class=\"ptsTableFrontedShell\">\n\t<!-- Style to display all tables correct-->\n\t<!-- this block will be remove in frontend.tables.editor.block.base after init -->\n\t<div class=\"ptsPreDisplayStyle\">\n\t\t<style>\n\t\t\t.ptsBlock {\n\t\t\t\topacity: 0;\n\t\t\t\tvisibility: hidden;\n\t\t\t}\n\t\t<\/style>\n\t<\/div>\n\t<div id=\"ptsBlock_476908\" data-original-id=\"7\" class=\"ptsBlock \" data-id=\"8\">\n\t\t\t<style type=\"text\/css\" class=\"ptsBlockStyle\">#ptsBlock_476908 {  width:100%;}\n\n#ptsBlock_476908 .ptsCol {      width:33.333333333333%;}\n\n#ptsBlock_476908 .ptsTableDescCol {    display: none;}\n\n#ptsBlock_476908 .ptsCol.ptsTableDescCol .ptsColFooter {\n\tvisibility: hidden;\n}\n\n#ptsBlock_476908 p {\n  margin: 0;\n}\n\n\/*Animations*\/\n#ptsBlock_476908 .ptsCol .ptsTableElementContent,\n#ptsBlock_476908 .ptsCol .ptsTableElementContent span {\n  transition: all 0.3s ease;\n    -webkit-transition: all 0.3s ease;\n    -moz-transition: all 0.3s ease;\n    -ms-transition: all 0.3s ease;\n    -o-transition: all 0.3s ease;\n}\n\n#ptsBlock_476908 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -webkit-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -moz-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n#ptsBlock_476908 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n\/** Template Style **\/\n#ptsBlock_476908 .ptsTableElementContent {\n    background:#fff;\n    border: solid 1px#f0f0f0;\n    box-shadow: 0 0 20px -2px #00000000;\n    position: relative;\n}\n\n#ptsBlock_476908 .ptsColHeader,\n#ptsBlock_476908 .ptsColDesc {\n    background:#fafafa;\n    padding: 40px 5px 30px 5px;\n  \tposition: relative;\n}\n\n#ptsBlock_476908 .ptsColDesc:before {\n\tcontent: '';\n  \tposition: absolute;\n  \tleft: 25%;\n  \tbottom: 0;\n  background-color:#333;\n  \theight: 1px;\n  \twidth: 50%;\n}\n\n#ptsBlock_476908 .ptsColHeader .ptsIcon i {\n\tfont-size: 55px;\n  \tcolor:#333;\n}\n\n#ptsBlock_476908 .ptsColHeader span,\n#ptsBlock_476908 .ptsColHeader p {\n    font-size: 28px;\n    color:#333;\n}\n\n#ptsBlock_476908 .ptsColDesc {\n    padding: 0 5px 20px 5px;\n}\n\n#ptsBlock_476908 .ptsRows {\n\tpadding-top: 20px;\n}\n\n#ptsBlock_476908 .ptsColDesc span,\n#ptsBlock_476908 .ptsColDesc p {\n    font-size: 24px;\n  \tcolor:#333;\n}\n\n#ptsBlock_476908 .ptsCell {\n  color:#333;\n}\n\n#ptsBlock_476908 .ptsCell span,\n#ptsBlock_476908 .ptsCell p {\n  font-size: 14px;\n}\n\n#ptsBlock_476908 .ptsColFooter {\n  padding: 20px 0 20px 0;\n}\n\n#ptsBlock_476908 .ptsColFooter .ptsActBtn a {\n    background-color:#fafafa;\n    text-decoration: blink;\n \tcolor:#fff;\n    font-size: 18px;\n    padding: 10px 20px;\n    border-radius: 4px;\n    position: relative;\n  \ttext-align: center;\n}\n\n#ptsBlock_476908 .ptsColFooter .ptsActBtn {\n\tmargin: 10px 0;\n  \ttext-align: center;\n}\n\n#ptsBlock_476908 .ptsColFooter .ptsActBtn a:before {\n    content: '';\n    position: absolute;\n    top: 0;\n    right: 0;\n    left: 0;\n    bottom: 0;\n    background-color: #fff;\n    opacity: 0;\n    transition: all .5s ease-out;\n}\n\n#ptsBlock_476908 .ptsColFooter .ptsActBtn a:hover:before {\n    opacity: .3;\n}<\/style>\n\t\t\t\t<div class=\"ptsBlockContent\"><div class=\"ptsContainer\">\n\t<div class=\"ptsColsWrapper ui-sortable\">\n\t\t<!-- Start Test Element -->\n             \t<div class=\"ptsEl ptsCol ptsCol-0 ptsElWithArea ptsTableDescCol\" data-el=\"table_col_desc\" style=\"min-height: auto;width: 33.3333%\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-pencil\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\"><i class=\"fa fa-2x ptsInputShell fa-pencil\"><\/i><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> PLAN - PRICE <\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Description<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 12px;background-color: #333\">READ MORE<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #333\">BUY NOW<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \t       \t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-1\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-space-shuttle\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\" target=\"_blank\"><i class=\"fa fa-2x ptsInputShell fa-space-shuttle\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Personal - \u20ac 150 (Early) \/&nbsp;<\/span><\/p><p><span style=\"text-align: center\" data-mce-style=\"text-align: center;\">\u20ac 200 (Normal)<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p> <br><\/p><p><span data-mce-style=\"\">Personal tickets are for<\/span><\/p><p><span data-mce-style=\"\">individuals where the&nbsp;<\/span><\/p><p><span data-mce-style=\"\">company does not <\/span><\/p><p><span data-mce-style=\"\">reimburse&nbsp; or pays for your tickets.<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-oxoe.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-2\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-briefcase\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\"><i class=\"fa fa-2x ptsInputShell fa-briefcase\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> Business - \u20ac&nbsp;480&nbsp;<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>If your company pays for your entrance,<\/p><p>please purchase a business ticket.<\/p><p><span data-mce-style=\"\">Doing it this way, allows us to <\/span><\/p><p><span data-mce-style=\"\">keep the conference affordable <\/span><\/p><p><span data-mce-style=\"\">for everyone!&nbsp;<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-oxoe.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-3\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\" id=\"\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125px\">\n\t\t\t\t\t<div data-icon=\"fa-university\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/www.eventbrite.co.uk\/e\/brucon-0x0a-tickets-46679916888#tickets\"><i class=\"fa fa-2x ptsInputShell fa-university\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 86px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Student&nbsp;- \u20ac 75<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 95px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>Tickets for students only,<\/p><p>you will have to provide a&nbsp;<\/p><p>valid student ID.&nbsp;<\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 99px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-oxoe.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \n\t\t\n\t\t<!-- End Test Element -->\n\t<\/div>\n\t<div style=\"clear: both\"><\/div>\n<\/div><\/div>\n\t\t<a title=\"WordPress Pricing Table\" style=\"display:none;\" href=\"https:\/\/supsystic.com\/plugins\/pricing-table\/?utm_medium=love_link_hide\" target=\"_blank\">WordPress Pricing Table<\/a><div style=\"clear: both;\"><\/div><\/div>\n<\/div>\n[\/vc_column_text][vc_message]Conference tickets sold out ? We plan to open up more tickets as of the 15th of July 2022. If there are no more conference tickets available, you can always consider purchasing a training ticket which will always allow you to purchase a conference ticket as well. Check out the <a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/\" target=\"_blank\" rel=\"noopener\">training page<\/a> for more info.[\/vc_message][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<b>Conference training\u00a0<\/b>is taking place between 26 and 28 September 2022. Check out the <a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/\" target=\"_blank\" rel=\"noopener\">training page<\/a> for more information[\/vc_column_text][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Advanced&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>The Corelan \u201cADVANCED\u201d exploit development class is a fast-paced, mind-bending, hands-on course where you will learn advanced heap exploit development techniques from an experienced exploit developer. During this 4-day class (sometimes just 3 \u201clong\u201d days at a conference), students will get the opportunity to learn how to write heap exploits for the Windows platform, using Windows 7, Windows 10 and Windows 11 as the example platform, but mostly focusing on learning &amp; applying generic techniques that can be applied to other operating systems and heap implementations. We will discuss differences between Windows 7 and Windows 10\/Windows 11 and explore previously undocumented techniques to achieve important exploitation primitives in Windows 10 &amp; Windows 11. The trainer will share his \u201cnotes from the field\u201d and various tips &amp; tricks to become more effective at writing exploits. This is most certainly not an entry level course. In fact, this is a one of the finest and most advanced courses you will find on Win32 heap exploit development, and probably the only one that dives deep into the Windows heap manager on Windows 7 and Windows 10\/11.<\/p>\n<p><strong>REMARK :<\/strong> This training starts at 9:00 and will end around 22:00 PM. That means +10 hours each day (Dinner will be foreseen)<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/corelan-advanced\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c238451748 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c238451748 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c238451748    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Azure Cloud Attacks for Red and Blue Teams&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>More than 95 percent of Fortune 500 use Azure today! A huge number of organizations now use Azure AD as an Identity and Access Management platform using the hybrid cloud model. This makes it imperative to understand the risks associated with Azure as not only the Windows infrastructure and apps use it but also identities of users across an enterprise are authenticated using it. In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications and infrastructure to Azure brings some very interesting opportunities and risks too. Often complex to understand, this setup of components, infrastructure and identity is a security challenge.<\/p>\n<p>This hands-on training aims towards abusing Azure and a number of services offered by it. We will cover multiple complex attack lifecycles against a lab containing multiple live Azure tenants. All the phases of Azure red teaming and pentesting \u2013 Recon, Initial access, Enumeration, Privilege Escalation, Lateral Movement, Persistence and Data mining are covered. We will also discuss<br \/>\ndetecting and monitoring for the techniques we use. The course is a mixture of fun, demos, exercises, hands-on and lecture. The training focuses more on methodology and techniques than tools.<br \/>\nIf you are a security professional trying to improve your skills in Azure cloud security, Azure Pentesting or Red teaming the Azure cloud this is the right class for you!<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/azure-cloud-attacks-for-red-and-blue-teams\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c238a12872 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c238a12872 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c238a12872    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Linux Forensics Inspection and Incident Response at scale&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>Attackers constantly find new ways to attack and infect Linux boxes using more and more sophisticated techniques and tools. As defenders, we need to stay up to date with adversaries, understand their TTPs and be able to respond quickly. The combination of low-level network and endpoint visibility is crucial to achieving that goal. For DFIR needs we could go even further with proactive forensics inspections. This training will guide you through different attack-detection-inspection-response use-cases and teach critical aspects of how to handle Linux incidents properly.<\/p>\n<p>Through the hands-on labs, you will gain a perfect understanding of important DFIR Linux\/Network internals and investigation steps needed to get the full picture of post-exploitation activities and artifacts left behind. At scale.<\/p>\n<p><strong>Instructor: <\/strong>Leszek Mi\u015b<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/linux-forensics-inspection-and-incident-response-at-scale\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c238ee1900 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c238ee1900 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c238ee1900    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;IoT Security Bootcamp&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This is a hands-on IoT hacking class. It covers all aspects of IoT Security, from the technologies and testing methodologies to the vulnerabilities. The main focus is offensive security: attacking and testing the devices and platforms. We first cover the basics and lay out the ground with concepts before diving into the actual hacking. This provides the understanding of what and why the things can be hacked, with a good mix of knowledge and learning-by-doing or in this case learning-by-hacking.<\/p>\n<p>Students will receive a IoT Hacking Kit (hardware with a value of +300 Euros), which contains the tools and some vulnerable devices used in class, so that they can continue sharpening their skills or hack devices after the event.<\/p>\n<p><strong>Instructor: <\/strong>Pablo Endres<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/iot-security-bootcamp\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c239495958 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c239495958 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c239495958    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Red &lt;3 Blue: Attack-Defense Purple Team Training&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffca&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Red and blue Teams often find themselves pitted against each other. This stems from the fact that their goals during an exercise are not always aligned. The red team aims to behave like a realistic threat actor and evade defenses to reach certain objectives in the targeted network. The blue team, often already swamped with ongoing activity, attempts to block, detect and react to all attacks on the organization.<\/p>\n<p>Red teamers are measured in stealth and how many objectives were achieved. Blue teams are measured in Mean Time to Detect (MTD) and Mean Time to Respond (MTR), how quickly they can contain and eliminate the threat. However, both parties individually spend significant time researching the same attacker techniques to improve their toolkits &amp; skillsets instead of working together against the real adversary. Why not work together? Enter Purple Teaming.<\/p>\n<p>This hands-on training connects red and blue in a series of live attack-defense exercises and demos. The group of participants will be split in two teams. On day one, the first team will be guided to attack a simulated corporate active directory environment. The other team will have access to defensive tooling to detect and respond to the attacks. On the second day, the teams change roles, and the exercise is repeated for a different attack path.<\/p>\n<p>Along the way, there will be regular purple team meetings, where the blue team presents detections and actions taken and the red team explains the executed techniques. Both days culminate in a lessons-learned moment, where you will be able to network and interact with your counterparts on the other side.<\/p>\n<p><strong>Instructors: <\/strong>Dennis Van Elst and Thomas Eug\u00e8ne<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday 27th)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/red-3-blue-attack-defense-purple-team-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c239926571 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c239926571 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c239926571    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Advanced Whiteboard Hacking \u2013 aka Hands-on Threat Modeling&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>In this 6th edition of our course, we improved our threat modeling training with the exclusive threat modeling war game with red and blue threat modeling teams. Engaged in capture the flag style threat modeling challenges your team will battle for control over an offshore wind turbine park.<\/p>\n<p>Also, in this edition we enhanced the section on privacy by design, compliance, and added a section on threat modeling medical devices. All participants get our Threat Modeling Playbook plus one-year access to our online threat modeling learning platform. As part of this training, you will be asked to create your own threat model, on which you will get individual feedback. One month after the training we organize an online review session with all the participants.<\/p>\n<p>As highly skilled professionals with years of experience under our belts, we\u2019re intimately familiar with the gap between academic knowledge of threat modeling and real-world practice. To minimize that gap, we have developed practical use cases, based on real-life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model.<br \/>\nUsing this methodology for the hands-on workshops we provide our students with a challenging training experience and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on the following:<\/p>\n<ul>\n<li>Diagramming web and mobile applications, sharing the same REST backend<\/li>\n<li>Threat modeling an IoT gateway with a cloud-based update service<\/li>\n<li>Get into the defender\u2019s head \u2013 modeling points of attack against a nuclear facility<\/li>\n<li>Threat mitigations of OAuth scenarios for an HR application<\/li>\n<li>Privacy analysis of a new face recognition system in an airport<\/li>\n<li>Battle for control over \u201cZwarte Wind\u201d, an offshore wind turbine park<\/li>\n<\/ul>\n<p><strong>Instructors:<\/strong>Sebastien Deleersnyder and Steven Wierckx<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday 27th)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/advanced-whiteboard-hacking-aka-hands-on-threat-modeling\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c239d69643 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c239d69643 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c239d69643    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0e-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Spring Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: center\"><strong>Spring Training program and tickets will be made available <span style=\"color: #b43836\">January 2022<\/span><\/strong><\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;600px&#8221;][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Bootcamp &#8211; Stack Exploitation (In person)&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong> The Corelan \u201cBOOTCAMP\u201d is a truly unique opportunity to learn both basic &amp; advanced techniques from an experienced exploit developer. During this 3 \u201c<em>long<\/em>\u201d days, students will be able to learn all ins and outs about writing reliable stack based exploits for the Windows platform.\u00a0 The trainer will share his \u201c<em>notes from the field<\/em>\u201d and various tips &amp; tricks to become more effective at writing exploits.\u00a0We believe it is important to start the course by explaining the basics of stack buffer overflows and exploit writing, but this is most certainly not \u201cyour average\u201d entry level course. In fact, this is a true bootcamp and one of the finest and most advanced courses you will find on Win32 stack based exploit development.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong>\u00a03-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/corelan-bootcamp-stack-exploitation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a> [\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25d6f1082 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25d6f1082 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25d6f1082    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0e-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;SOC-Class (Virtual)&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This course provides a comprehensive picture of a Cyber Security Operations Center (CSOC or SOC). Discussion on the technology needed to run a SOC are handled in a vendor agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well as budgets with global scope. Staff roles needed are enumerated. Informing and training staff through internal training and information sharing is addressed. The interaction between functional areas and data exchanged is detailed. Processes to coordinate the technology, the SOC staff, and the business are enumerated.<\/p>\n<p>After attending this class, the participant will have a roadmap (and Gantt chart) for what needs to be done in the organization seeking to implement security operations. Ideally, attendees will be\u00a0 SOC managers, team leads in security specializations or lead technical staff, security architects. CIO, CISO or CSO (Chief Security Officer) is the highest level in the organization appropriate to\u00a0 attend.<\/p>\n<p><strong>Instructor: <\/strong>Christopher Crowley<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/soc-class\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25dc26187 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25dc26187 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25dc26187    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon.org\" target=\"_self\">Cancelled<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;IoT Security Bootcamp (In-Person)&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This is a hands-on IoT hacking class. It covers all aspects of IoT Security, from the technologies and testing methodologies to the vulnerabilities. The main focus is offensive security: attacking and testing the devices and platforms. We first cover the basics and lay out the ground with concepts before diving into the actual hacking. This provides the understanding of what and why the things can be hacked, with a good mix of knowledge and learning-by-doing or in this case learning-by-hacking.<\/p>\n<p>Students will receive a IoT Hacking Kit (hardware with a value of +300 Euros), which contains the tools and some vulnerable devices used in class, so that they can continue sharpening their skills or hack devices after the event.<\/p>\n<p><strong>Instructor: <\/strong>Pablo Endres<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/iot-security-bootcamp\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25e19391 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25e19391 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25e19391    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon.org\" target=\"_self\">Moved to September<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Active Directory Attacks for Red and Blue Teams &#8211; Advanced Edition (Virtual)&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:<\/strong>Enterprises are managed using Active Directory (AD) and it often forms the backbone of the complete enterprise network. Therefore, to secure an enterprise from an adversary, it is inevitable to secure its AD environment. To secure AD, you must understand different techniques and attacks used by adversaries against it. Often burdened with maintaining backward compatibility and interoperability with a variety of products, AD environments lack ability to tackle latest threats.<\/p>\n<p>This training is aimed towards attacking modern AD Environment using built-in tools like PowerShell and other trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments.<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/active-directory-attacks-for-red-and-blue-teams-advanced-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25e622456 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25e622456 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25e622456    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0e-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Defending Enterprises &#8211; 2022 Edition (Virtual)&#8221; tab_id=&#8221;1528017973492-69465b61-de01&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>Updated for 2022, our immersive 2-day Defending Enterprises training is the natural counterpart to\u00a0\u00a0our popular Hacking Enterprises course.\u00a0From SIEM configuration oversight to monitoring, alerting and threat hunting, you\u2019ll play a SOC\u00a0\u00a0analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA\u2019s and IOC\u2019s from an\u00a0\u00a0enterprise breach executed by the trainers.<\/p>\n<p>Whether you\u2019re new to Kusto Query Language (KQL) or a seasoned pro, there\u2019s plenty for you in the\u00a0\u00a02-days! Yes, we\u2019re using Microsoft Sentinel, but the underlying threat detection theory, logic and\u00a0threat hunting approach is transferable into your own environments, whatever your preferred\u00a0\u00a0platform is.<\/p>\n<p>We look at the top 10 methods we use in offensive engagements and show how these can be caught,\u00a0\u00a0along with numerous other examples and methods that go above and beyond these common TTPs!<\/p>\n<p><strong>Instructor: <\/strong>Owen Shearing \/ Will Hunt<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Thursday 21st of April)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/defending-enterprises-2022-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25ea88843 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25ea88843 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25ea88843    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0e-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking and Securing Cloud Infrastructure (In-person)&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcb&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>This 3-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical.<\/p>\n<p>This class covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure<\/p>\n<p><strong>Instructor: <\/strong>Anthony Webb<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/hacking-and-securing-cloud-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25eed2161 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25eed2161 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25eed2161    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0e-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Deep Dive into Fuzzing (Virtual)&#8221; tab_id=&#8221;1528018036023-50094a93-3fed&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Fuzzing is a technique of identifying software vulnerabilities by automated corpus generation. It has produced immense results and attracted a lot of visibility from security researchers and professionals in the industry, today fuzzing can be utilized in various ways which can be incorporated into your secure SDLC to discover vulnerabilities in advance and fix them.<\/p>\n<p>Finding vulnerabilities in software requires in-depth knowledge of different technology stacks. Modern day software\u2019s have a huge codebase and may contain vulnerabilities. Manually verifying such vulnerabilities is a tedious task and may not be possible in all cases. This training is designed in such a way that it introduces the concept of fuzzing and vulnerability discovery in software\u2019s covering multiple platforms such as Linux &amp; Windows and triage analysis for those vulnerabilities.<\/p>\n<p>During this training, attendees would be emulating techniques which would provide a comprehensive understanding of \u201cCrash, Detect &amp; Triage\u201d of fuzzed binaries or software. In \u201cDeep dive into fuzzing\u201d we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.<\/p>\n<p><strong>Instructor: <\/strong>Dhiraj Mishra \/ Zubin Devnani<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Thursday 21st of April)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2022\/brucon-2022-training\/deep-dive-into-fuzzing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d0e38c25f303459 .gem-button svg {fill: #ffffff;}.thegem-button-69d0e38c25f303459 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69d0e38c25f303459    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0e-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][vc_empty_space height=&#8221;200px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Conference Tickets [\/vc_column_text][vc_column_text] Ticket sale will start on June 1st 2022 at 5 PM CET.\u00a0 [\/vc_column_text][vc_column_text][\/vc_column_text][vc_message]Conference tickets sold out ? We plan to open up more tickets as of the 15th of July 2022. If there are no more conference tickets available, you can always consider purchasing a training ticket which will always allow you to purchase a conference ticket as well. Check out the training page for more info.[\/vc_message][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Training Tickets [\/vc_column_text][vc_column_text]Conference training\u00a0is&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":56,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":3158,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/pages\/6\/revisions\/3158"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}