{"id":6,"date":"2018-06-02T12:02:36","date_gmt":"2018-06-02T12:02:36","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/?page_id=6"},"modified":"2024-06-19T16:29:12","modified_gmt":"2024-06-19T14:29:12","slug":"tickets","status":"publish","type":"page","link":"https:\/\/archive.brucon.org\/2024\/tickets\/","title":{"rendered":"Tickets"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Conference Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #b43836\">TICKET SALE STARTS ON JUne 1st at 5 PM CET<\/span><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<div class=\"ptsTableFrontedShell\">\n\t<!-- Style to display all tables correct-->\n\t<!-- this block will be remove in frontend.tables.editor.block.base after init -->\n\t<div class=\"ptsPreDisplayStyle\">\n\t\t<style>\n\t\t\t.ptsBlock {\n\t\t\t\topacity: 0;\n\t\t\t\tvisibility: hidden;\n\t\t\t}\n\t\t<\/style>\n\t<\/div>\n\t<div id=\"ptsBlock_844374\" data-original-id=\"7\" class=\"ptsBlock \" data-id=\"8\">\n\t\t\t<style type=\"text\/css\" class=\"ptsBlockStyle\">#ptsBlock_844374 {  width:100%;}\n\n#ptsBlock_844374 .ptsCol {      width:33.333333333333%;}\n\n#ptsBlock_844374 .ptsTableDescCol {    display: none;}\n\n#ptsBlock_844374 .ptsCol.ptsTableDescCol .ptsColFooter {\n\tvisibility: hidden;\n}\n\n#ptsBlock_844374 p {\n  margin: 0;\n}\n\n\/*Animations*\/\n#ptsBlock_844374 .ptsCol .ptsTableElementContent,\n#ptsBlock_844374 .ptsCol .ptsTableElementContent span {\n  transition: all 0.3s ease;\n    -webkit-transition: all 0.3s ease;\n    -moz-transition: all 0.3s ease;\n    -ms-transition: all 0.3s ease;\n    -o-transition: all 0.3s ease;\n}\n\n#ptsBlock_844374 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -webkit-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n  -moz-box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n#ptsBlock_844374 .ptsCol.hover .ptsTableElementContent {\n  z-index: 101;\n  box-shadow: 0 0 10px rgba(0, 0, 0, 0.5);\n}\n\n\/** Template Style **\/\n#ptsBlock_844374 .ptsTableElementContent {\n    background:#fff;\n    border: solid 1px#f0f0f0;\n    box-shadow: 0 0 20px -2px #00000000;\n    position: relative;\n}\n\n#ptsBlock_844374 .ptsColHeader,\n#ptsBlock_844374 .ptsColDesc {\n    background:#fafafa;\n    padding: 40px 5px 30px 5px;\n  \tposition: relative;\n}\n\n#ptsBlock_844374 .ptsColDesc:before {\n\tcontent: '';\n  \tposition: absolute;\n  \tleft: 25%;\n  \tbottom: 0;\n  background-color:#333;\n  \theight: 1px;\n  \twidth: 50%;\n}\n\n#ptsBlock_844374 .ptsColHeader .ptsIcon i {\n\tfont-size: 55px;\n  \tcolor:#333;\n}\n\n#ptsBlock_844374 .ptsColHeader span,\n#ptsBlock_844374 .ptsColHeader p {\n    font-size: 28px;\n    color:#333;\n}\n\n#ptsBlock_844374 .ptsColDesc {\n    padding: 0 5px 20px 5px;\n}\n\n#ptsBlock_844374 .ptsRows {\n\tpadding-top: 20px;\n}\n\n#ptsBlock_844374 .ptsColDesc span,\n#ptsBlock_844374 .ptsColDesc p {\n    font-size: 24px;\n  \tcolor:#333;\n}\n\n#ptsBlock_844374 .ptsCell {\n  color:#333;\n}\n\n#ptsBlock_844374 .ptsCell span,\n#ptsBlock_844374 .ptsCell p {\n  font-size: 14px;\n}\n\n#ptsBlock_844374 .ptsColFooter {\n  padding: 20px 0 20px 0;\n}\n\n#ptsBlock_844374 .ptsColFooter .ptsActBtn a {\n    background-color:#fafafa;\n    text-decoration: blink;\n \tcolor:#fff;\n    font-size: 18px;\n    padding: 10px 20px;\n    border-radius: 4px;\n    position: relative;\n  \ttext-align: center;\n}\n\n#ptsBlock_844374 .ptsColFooter .ptsActBtn {\n\tmargin: 10px 0;\n  \ttext-align: center;\n}\n\n#ptsBlock_844374 .ptsColFooter .ptsActBtn a:before {\n    content: '';\n    position: absolute;\n    top: 0;\n    right: 0;\n    left: 0;\n    bottom: 0;\n    background-color: #fff;\n    opacity: 0;\n    transition: all .5s ease-out;\n}\n\n#ptsBlock_844374 .ptsColFooter .ptsActBtn a:hover:before {\n    opacity: .3;\n}<\/style>\n\t\t\t\t<div class=\"ptsBlockContent\"><div class=\"ptsContainer\">\n\t<div class=\"ptsColsWrapper ui-sortable\">\n\t\t<!-- Start Test Element -->\n             \t<div class=\"ptsEl ptsCol ptsCol-0 ptsElWithArea ptsTableDescCol\" data-el=\"table_col_desc\" style=\"min-height: auto;width: 33.3333%\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125.333px\">\n\t\t\t\t\t<div data-icon=\"fa-pencil\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\"><i class=\"fa fa-2x ptsInputShell fa-pencil\"><\/i><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsShow\" style=\"height: 85.3333px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> PLAN - PRICE <\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 94px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Description<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 98.6667px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 12px;background-color: #333\">READ MORE<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"#\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #333\">BUY NOW<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \t       \t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-1\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125.333px\">\n\t\t\t\t\t<div data-icon=\"fa-space-shuttle\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\" target=\"_blank\"><i class=\"fa fa-2x ptsInputShell fa-space-shuttle\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 85.3333px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Personal - \u20ac 150 (Early) \/&nbsp;<\/span><\/p><p><span style=\"text-align: center\" data-mce-style=\"text-align: center;\">\u20ac 200 (Normal)<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 94px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><br><\/p><p><span data-mce-style=\"\">Personal tickets are for<\/span><\/p><p><span data-mce-style=\"\">individuals where the&nbsp;<\/span><\/p><p><span data-mce-style=\"\">company does not <\/span><\/p><p><span data-mce-style=\"\">reimburse&nbsp; or pays for your tickets.<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 98.6667px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-2\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125.333px\">\n\t\t\t\t\t<div data-icon=\"fa-briefcase\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\"><i class=\"fa fa-2x ptsInputShell fa-briefcase\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 85.3333px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\"> Business - \u20ac&nbsp;480&nbsp;<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 94px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>If your company pays for your entrance,<\/p><p>please purchase a business ticket.<\/p><p><span data-mce-style=\"\">Doing it this way, allows us to <\/span><\/p><p><span data-mce-style=\"\">keep the conference affordable <\/span><\/p><p><span data-mce-style=\"\">for everyone!&nbsp;<\/span><\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 98.6667px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"ptsEl ptsCol ptsElWithArea ptsCol-3\" data-el=\"table_col\" style=\"height: auto;min-height: auto;width: 33.3333%\" data-color=\"#000000ff\" id=\"\">\n\t\t\t<div class=\"ptsTableElementContent ptsElArea\">\n\t\t\t\t<div class=\"ptsColHeader ptsCell ptsShow\" style=\"height: 125.333px\">\n\t\t\t\t\t<div data-icon=\"fa-university\" data-type=\"icon\" data-el=\"table_cell_icon\" class=\"ptsIcon ptsEl ptsElInput\" data-color=\"#000000ff\"><a class=\"ptsLink\" target=\"_blank\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\"><i class=\"fa fa-2x ptsInputShell fa-university\" style=\"color: #000000\"><\/i><\/a><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColDesc ptsToggle ptsShow\" style=\"height: 85.3333px\">\n\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p><span data-mce-style=\"\">Student&nbsp;- \u20ac 75<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsRows ui-sortable\" style=\"height: auto\">\n\t\t\t\t\t<div class=\"ptsCell\" style=\"height: 94px\">\n\t\t\t\t\t\t<div class=\"ptsEl\" data-el=\"table_cell_txt\" data-type=\"txt\"><p>Tickets for students only,<\/p><p>you will have to provide a&nbsp;<\/p><p>valid student ID.&nbsp;<\/p><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"ptsColFooter ptsShow\" style=\"height: 98.6667px\">\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"ptsActBtnWp\">\n\t\t\t\t\t\t<div class=\"ptsActBtn ptsEl ptsElInput\" data-el=\"btn\" data-bgcolor-elements=\"a\" data-bgcolor-to=\"bg\">\n\t\t\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/brucon-0x10.eventbrite.co.uk\" class=\"ptsEditArea ptsInputShell\" style=\"font-size: 14px;background-color: #b43836\">Read More<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n      \n\t\t\n\t\t<!-- End Test Element -->\n\t<\/div>\n\t<div style=\"clear: both\"><\/div>\n<\/div><\/div>\n\t\t<a title=\"Pricing Table Plugin\" style=\"display:none;\" href=\"https:\/\/supsystic.com\/plugins\/pricing-table\/?utm_medium=love_link_hide\" target=\"_blank\">Pricing Table Plugin<\/a><div style=\"clear: both;\"><\/div><\/div>\n<\/div>\n[\/vc_column_text][vc_message message_box_color=&#8221;pink&#8221; icon_fontawesome=&#8221;fas fa-exclamation-triangle&#8221;]<span class=\"css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3\">The 15th of July at 5 PM CEST sharp, a (probably last) batch of business <\/span><span class=\"css-1jxf684 r-bcqeeo r-1ttztb7 r-qvutc0 r-poiln3\">tickets will be made available.<\/span>[\/vc_message][vc_message]Conference tickets sold out ? If there are no more conference tickets available, you can always consider purchasing a training ticket which will always allow you to purchase a conference ticket as well. Check out the <a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/\" target=\"_blank\" rel=\"noopener\">training page<\/a> for more info.[\/vc_message][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<b>Conference training\u00a0<\/b>is taking place between 16-18 September. Check out the <a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/\">training page<\/a> for more information[\/vc_column_text][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan Heap Masterclass&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description: <\/strong>The Corelan \u201cHEAP\u201d exploit development MASTERCLASS is a fast-paced, mind-bending, hands-on course where you will learn advanced heap manipulation and exploit development techniques from an experienced exploit developer. During this 4 or 5-day class (sometimes just 3 \u201clong\u201d days at a conference), students will get the opportunity to learn how to write heap exploits for the Windows platform, using Windows 7, Windows 10 and Windows 11 as the example platform, but mostly focusing on learning &amp; applying generic techniques that can be applied to other operating systems and heap implementations. We will discuss differences between Windows 7 and Windows 10\/Windows 11 and explore previously undocumented techniques to achieve important exploitation primitives in Windows 10 &amp; Windows 11. \u00a0The trainer will share his \u201cnotes from the field\u201d and various tips &amp; tricks to become more effective at writing exploits.<\/p>\n<p>This is most certainly not an entry level course. In fact, this is a one of the finest and most advanced courses you will find on heap exploit development for Windows, and probably the only one that dives deep into the Windows heap manager on Windows 7 and Windows 10\/11 and demystifies how the heap really works.<\/p>\n<p><strong>REMARK :<\/strong> This training starts at 9:00 and will end around 22:00 PM. That means +10 hours each day (Dinner will be foreseen)<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/corelan-heap-masterclass\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bed887808 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bed887808 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bed887808    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Azure Cloud Attacks for Red and Blue Teams&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>More than 95 percent of Fortune 500 use Azure today! A huge number of organizations now use\u00a0 Azure AD as an Identity and Access Management platform using the hybrid cloud model. This\u00a0 makes it imperative to understand the risks associated with Azure as not only the Windows\u00a0 infrastructure and apps use it but also identities of users across an enterprise are authenticated\u00a0 using it.<\/p>\n<p>In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications\u00a0 and infrastructure to Azure brings some very interesting opportunities and risks too. Often\u00a0 complex to understand, this setup of components, infrastructure and identity is a security\u00a0 challenge.\u00a0This hands-on training aims towards abusing Azure and a number of services offered by it. We\u00a0 will cover multiple complex attack lifecycles against a lab containing\u00a0<b>multiple live Azure tenants<\/b>.<\/p>\n<p>All the phases of Azure red teaming and pentesting \u2013 Recon, Initial access, Enumeration, Privilege\u00a0 Escalation, Lateral Movement, Persistence and Data mining are covered. We will also discuss\u00a0 detecting and monitoring for the techniques we use.\u00a0The course is a mixture of fun, demos, exercises, hands-on and lecture. The training focuses more\u00a0 on methodology and techniques than tools.<\/p>\n<p>If you are a security professional trying to improve your skills in Azure cloud security, Azure\u00a0 Pentesting or Red teaming the Azure cloud this is the right class for you!<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/azure-cloud-attacks-for-red-and-blue-teams\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bedeb9621 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bedeb9621 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bedeb9621    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking Enterprises &#8211; 2024 Red Edition&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong><em>Updated for 2024, our Hacking Enterprises training is the natural counterpart to our popular Defending Enterprises course.<\/em><\/p>\n<p>In this multi-layered offensive engagement, you will fully compromise a simulated enterprise in this immersive hands-on course that covers a multitude of TTP\u2019s. Targeting modern operating systems including Windows 11, you\u2019ll use modern techniques and focus on exploiting configuration weaknesses rather than throwing traditional exploits. Logical thinking and creativity will definitely be put to the test!<\/p>\n<p>You will work to get initial access in a fictional organisation where multiple networks exist, some easily accessible, others not so. You\u2019ll implant and establish C2, but manual techniques will always be emphasised so you\u2019re equipped with the knowledge to work without reliance on frameworks.<\/p>\n<p>Course content has been designed to reflect real-world challenges and you\u2019ll perform numerous hands-on exercises including executing exploitative phishing campaigns against our simulated users for initial access, finding new networks that in turn bring new challenges including IPv6 exploitation, subverting AMSI and AWL, credential harvesting, passphrase cracking, pivoting, lateral movement, ADCS abuse, userland and privileged persistence via OOB channels and much more!<\/p>\n<p><strong>Instructor: <\/strong>William Hunt and Owen Shearing<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/hacking-enterprises-2024-red-edition\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bee5e3775 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bee5e3775 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bee5e3775    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Operational Purple Teaming for Defenders&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This hands-on training connects red and blue in a series of live attack-defense exercises and demos. The group of participants will work as one team against a simulated threat actor, APT 0x00, with full disclosure of the attacker\u2019s progress and technical insights on the executed\u00a0 techniques. The adversary\u2019s capability and stealth will steadily improve over the course of the training.<\/p>\n<p>Participants are dropped in a simulated corporate network environment, which they must defend from a threat actor over the course of the training. The attacker is simulated by a red team specialist, who will share valuable insights about commonly used threat actor techniques used in the attack. Together with a blue team instructor, you will learn how to hunt for these techniques, build detections that can help defend your organization and eradicate the attacker.<\/p>\n<p><strong>Instructor: <\/strong>Dennis Van Elst and Thomas Eug\u00e8ne<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/operational-purple-teaming-for-defenders\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9beeb44714 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9beeb44714 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9beeb44714    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;A Complete Practical Approach to Malware Analysis &amp; Threat Hunting Using Memory Forensics&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffca&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>This hands-on training teaches the concepts, tools, and techniques to analyze, investigate and hunt malwares by combining two powerful techniques malware analysis and memory forensics.This course will introduce attendees to basics of malware analysis, reverse engineering, Windows internals and memory forensics, it then gradually progresses deep into more advanced concepts of malware analysis &amp; memory forensics. Attendees will learn to perform static, dynamic, code and memory analysis.<\/p>\n<p>This course consists of scenario-based hands-on labs after each module which involves analyzing real-world malware samples and infected memory images (crimeware, APT malware, fileless malwares, Rootkits etc). This hands-on training is designed to help attendees gain a better understanding of the subject in short span. Throughout the course, the attendees will learn the latest techniques used by the adversaries to compromise and persist on the system.<\/p>\n<p>The training also demonstrates how to integrate the malware analysis and forensics techniques into a custom sandbox to automate the analysis of malicious code. After taking this course attendees will be better equipped with skills to analyze, investigate and respond to malware-related incidents.<\/p>\n<p><strong>Instructors: <\/strong>Monnappa K A and Sajan Shetty<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/a-complete-practical-approach-to-malware-analysis-and-threat-hunting-using-memory-forensics\/\" target=\"_blank\" rel=\"noopener\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bef0f6198 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bef0f6198 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bef0f6198    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Physical Security Testing&#8221; tab_id=&#8221;1528018016531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Learn how attackers are covertly gaining physical entry into your environment to steal data, access systems, deploy network implants and listening\/video devices. We will teach you the TTPs the attackers are using to incorporate into your Red Team engagements or perform audits on your own. Over 3 days of immersive and hands-on training we will teach you the skills you need to be able to perform physical security engagements as part of a blue team or red team in a legal, safe, and professional manner.<\/p>\n<p>Curriculum:<\/p>\n<ul>\n<li>Roles of locks in society<\/li>\n<li>Ethics &amp; Laws of Physical Security<\/li>\n<li>Physical Recon (remote and up close)<\/li>\n<li>Door Assessment<\/li>\n<li>Locking Picking<\/li>\n<li>Lock bypassing<\/li>\n<li>Decoding keys &amp; Locks<\/li>\n<li>Field Key generation<\/li>\n<li>Door bypassing<\/li>\n<li>Window bypassing<\/li>\n<li>Essential Alarm Bypassing<\/li>\n<li>Master Keying and Keyed Alike systems<\/li>\n<li>Access Control Systems<\/li>\n<li>ID Badge cloning attacks<\/li>\n<li>PACS Reader attacks<\/li>\n<li>Weaponizing Readers<\/li>\n<li>Social Engineering<\/li>\n<\/ul>\n<p><strong>Each student will leave with a comprehensive tool kit containing everything they need to get started in this up-and-coming area of Red Teaming, Penetration Testing and Consultancy.<\/strong><\/p>\n<p><strong>Instructors: <\/strong>Chris Cowling and Ji\u0159i Vanek<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/physical-security-testing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bef678592 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bef678592 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bef678592    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;A quick, efficient, yet not entirely sane, primer on Cyber Deception&#8221; tab_id=&#8221;1528017916531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.<\/p>\n<p>In this class, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy\u2019s system. And most importantly, you will find out how to do the above legally.<\/p>\n<p>The current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately, others may take you a while to implement. Either way, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers, attribute who is attacking you, and finally, attack the attackers.<\/p>\n<p>This class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.<\/p>\n<p><strong>This course is different from other courses\u2026<\/strong><\/p>\n<ul>\n<li>The concepts, the approach, the labs<\/li>\n<li>Most of the labs are not in the slides (because we like you :-))<\/li>\n<li>This makes them more accessible after class, when you need them most<\/li>\n<li>All labs using the VM are inside the VM, within github<\/li>\n<li>This means you do not have to dig through hundreds of pages to figure out how something works later<\/li>\n<li>There are also prerecorded video walkthroughs of each lab on the USB and embedded in Discord!<\/li>\n<\/ul>\n<p><strong>Instructors: <\/strong>John Strand<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday 17th of September)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/a-quick-efficient-yet-not-entirely-sane-primer-on-cyber-deception\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9befaf7076 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9befaf7076 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9befaf7076    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;DevSecOps Masterclass: AppSec Automation Edition&#8221; tab_id=&#8221;1528015916531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>DevOps has changed the way we deliver apps. However, security remains a serious bottleneck, especially Application Security. This is largely due to the speed of innovation in DevOps, contrasted with the escalating attacks against Applications.<\/p>\n<p>This training takes a comprehensive, focused and practical approach at implementing DevSecOps Practices with a focus on Application Security Automation. The training is based on our 4.9\/5 Rated DevSecOps Masterclass at Blackhat.<\/p>\n<p>The training is a hardcore hands-on journey into:<\/p>\n<ul>\n<li>Hands-on SAST for Apps and Infrastructure-as-Code, with a focus on Semgrep and CodeQL. Develop Custom SAST rules like a bawse!<\/li>\n<li>Supply-Chain Security Automation: SBOMs, Source Composition Analysis and Security Engineering techniques<\/li>\n<li>Assurance and Provenance for artifacts. Mastery over Cosign and SLSA for Supply-Chain Provenance<\/li>\n<li>DAST Automation and Security Regressions with ZAP and Nuclei.<\/li>\n<li>Policy-As-Code: Leverage Open Policy Agent (OPA) with use-cases from API Access Control to OS Policy Controls.<\/li>\n<\/ul>\n<p><strong>Participants get a 2 month access to our online lab environment for DevSecOps training<\/strong><\/p>\n<p><strong>Instructors: <\/strong>Vishnu Prasad and Abhay Bhargav<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday 17th of September)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/devsecops-masterclass-appsec-automation-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9beff69911 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9beff69911 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9beff69911    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x10-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;CTI + DE&amp;TH: Intelligence Driven Detection Engineering and Threat Hunting&#8221; tab_id=&#8221;1518018016531-357a1ad0-ffcq&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>The Paralus Technical Cyber Threat Intelligence (CTI) plus Detection Engineering and Threat Hunting (DE&amp;TH) training is designed to be an intensive and technical introduction to these security concepts. By working through topics in a rapid, focused nature, students will quickly gain familiarity with core principles behind CTI work and how this applies to and informs subsequent DE&amp;TH operations.<\/p>\n<p>This course is designed to be highly interactive and conversational, with opportunities to test out and explore concepts within the material to ensure the greatest possible immersion into critical CTI and DE&amp;TH ideas. Building on a foundation of core CTI concepts, attendees will then work towards immediate applications of CTI research across DE&amp;TH deliverables, including proper development mechanisms within detection engineering and hypothesis development and testing for threat hunting.<\/p>\n<p><strong>Instructors: <\/strong>Joe Slowik<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Tuesday 17th of September)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2024-training\/cti-deth-intelligence-driven-detection-engineering-and-threat-hunting\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9bf03b7258 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9bf03b7258 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9bf03b7258    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon0x0f-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #b43836\">TRAINING sale will BE MADE AVAILABLE IN JUNE 2024<\/span><\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center\">Spring Training Tickets<\/h2>\n<p>[\/vc_column_text][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<\/p>\n<h5 style=\"text-align: center\"><span style=\"color: #b43836\">SPRING TRAINING sale will BE MADE AVAILABLE IN JANUARY 2023<\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;600px&#8221;][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column][vc_column_text]<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_tta_tour controls_size=&#8221;md&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Corelan BOOTCAMP (In-person)&#8221; tab_id=&#8221;1528017211991-3021362b-266a&#8221;][vc_column_text]<strong>Description:<\/strong> The Corelan \u201cBOOTCAMP\u201d is a truly unique opportunity to learn both basic &amp; advanced techniques from an experienced exploit developer. During these 3 \u201clong\u201d days, students will be able to learn all ins and outs about writing reliable stack based exploits for the Windows platform.\u00a0 The trainer will share his \u201cnotes from the field\u201d and various tips &amp; tricks to become more effective at writing exploits. We believe it is important to start the course by explaining the basics of stack buffer overflows and exploit writing, but this is most certainly not \u201cyour average\u201d entry level course. In fact, this is a true bootcamp and one of the finest and most advanced courses you will find on Win32 stack based exploit development.<\/p>\n<p><strong>Instructor:\u00a0<\/strong>Peter Van Eeckhoutte<\/p>\n<p><strong>Duration:<\/strong>\u00a03-day course<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2023-training\/corelan-bootcamp\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a> [\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9c07d29336 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9c07d29336 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9c07d29336    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0f-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Active Directory Attacks for Red and Blue Teams &#8211; Advanced Edition (Virtual)&#8221; tab_id=&#8221;1528017987986-d85cab87-28e0&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>More than 95% of Fortune 500 companies use Active Directory! Enterprises are managed using Active Directory (AD) and it often forms the backbone of the complete enterprise network. Therefore, to secure an enterprise from an adversary, it is inevitable to secure its AD environment. To secure AD, you must understand different techniques and attacks used by adversaries against it. Often burdened with maintaining backward compatibility and interoperability with a variety of products, AD environments lack ability to tackle latest threats.<\/p>\n<p>This training is aimed towards attacking modern AD Environment using built-in tools and trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments.<\/p>\n<p><strong>Instructor: <\/strong>Nikhil Mittal<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2023-training\/active-directory-attacks-for-red-and-blue-teams-advanced-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9c082c6246 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9c082c6246 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9c082c6246    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0f-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Hacking Modern Web &amp; Desktop apps: Master the Future of Attack Vectors (In-person)&#8221; tab_id=&#8221;1528017212014-71159b30-4998&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This course is a 100% hands-on deep dive into the OWASP Security Testing Guide and relevant items of the OWASP Application Security Verification Standard (ASVS), so this course covers and goes beyond the OWASP Top Ten.<\/p>\n<p>Long are the days since web servers were run by perl scripts and desktop apps written in Delphi. What is common between Walmart, eBay, PayPal, Microsoft, LinkedIn, Google and Netflix? They all use Node.js: JavaScript on the server. What is common between Microsoft Teams, Skype, Bitwarden, Slack and Discord? All of them are written in Electron: JavaScript on the client.<\/p>\n<p>Modern Web and Desktop apps share traditional attack vectors and also introduce new opportunities to threat actors. This course will teach you how to review modern web and desktop apps, showcasing Node.js and Electron but using techniques that will also work against any other web or desktop app platform. Ideal for Penetration Testers, Web and Desktop app Developers as well as everybody interested in JavaScript\/Node.js\/Electron app security.<\/p>\n<p><strong>Instructor: <\/strong>Abraham Aranguren<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><strong>Cancelled and moved to September<\/strong>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cloud Security Masterclass: Defender&#8217;s Guide to Securing AWS &amp; Azure Infrastructure (Virtual)&#8221; tab_id=&#8221;1528017973492-69465b61-de00&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>This hands-on CTF-style training focuses on elevating your security knowledge into the cloud. Learn to defend your AWS &amp; Azure cloud infrastructure by building automated detection, alerting and response pipelines for your\u00a0 workloads by using native cloud services. This training focuses on building\u00a0 security knowledge on the cloud and for the cloud.<\/p>\n<p>This training takes both\u00a0 investigator and builder approach towards security. It teaches you the fundamentals of cloud infrastructure security and focuses on building highly scalable threat detection, monitoring, and response tools by\u00a0 using cloud-native services like serverless, containers, object stores, IAM\/AD,\u00a0 logic apps, SQL\/KQL queries and much more.<\/p>\n<p><strong>Instructor: <\/strong>Abhinav Singh<\/p>\n<p><strong>Duration:<\/strong> 3-day<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2023-training\/cloud-security-masterclass-defenders-guide-to-securing-aws-azure-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9c08767688 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9c08767688 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9c08767688    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0f-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Defending Enterprises &#8211; 2023 Edition (In-person)&#8221; tab_id=&#8221;1528017973492-69465b61-de01&#8243;][vc_column_text]<strong>Description:\u00a0<\/strong>Updated for 2023, our immersive 2-day Defending Enterprises training is the natural counterpart to\u00a0\u00a0our popular Hacking Enterprises course.\u00a0\u00a0You\u2019ll play a SOC analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA\u2019s and\u00a0\u00a0IOC\u2019s from a live enterprise breach executed by the trainers in real time.<\/p>\n<p>Whether you\u2019re new to Kusto Query Language (KQL) or a seasoned pro, there\u2019s plenty for you in the\u00a0\u00a02-days! Yes, we\u2019re using Microsoft Sentinel, but the underlying threat detection theory, logic and\u00a0\u00a0threat hunting approach is transferable into your own environments, whatever your preferred\u00a0\u00a0platform.<\/p>\n<p>We look at the top 10+ methods we use in offensive engagements and show how these can be\u00a0\u00a0caught, along with numerous other examples and methods that go above and beyond these common\u00a0TTPs!<\/p>\n<p><strong>Instructor: <\/strong>Owen Shearing \/ Will Hunt<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Thursday 20th of April)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2023-training\/defending-enterprises-2023-edition\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9c08be5140 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9c08be5140 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9c08be5140    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0f-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][vc_tta_section title=&#8221;Deep Dive into Fuzzing (Virtual)&#8221; tab_id=&#8221;1528018036023-50094a93-3fed&#8221;][vc_column_text]<strong>Description:\u00a0<\/strong>Fuzzing is a technique of identifying software vulnerabilities by automated corpus generation. It has produced immense results and attracted a lot of visibility from security researchers and professionals in the industry, today fuzzing can be utilized in various ways which can be incorporated into your secure SDLC to discover vulnerabilities in advance and fix them.<\/p>\n<p>Finding vulnerabilities in software requires in-depth knowledge of different technology stacks. Modern day software\u2019s have a huge codebase and may contain vulnerabilities. Manually verifying such vulnerabilities is a tedious task and may not be possible in all cases. This training is designed in such a way that it introduces the concept of fuzzing and vulnerability discovery in software\u2019s covering multiple platforms such as Linux &amp; Windows and triage analysis for those vulnerabilities.<\/p>\n<p>During this training, attendees would be emulating techniques which would provide a comprehensive understanding of \u201cCrash, Detect &amp; Triage\u201d of fuzzed binaries or software. In \u201cDeep dive into fuzzing\u201d we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.<\/p>\n<p><strong>Instructor: <\/strong>Dhiraj Mishra \/ Zubin Devnani<\/p>\n<p><strong>Duration:<\/strong> 2-day (Starting Thursday 20th of April)<\/p>\n<p><a href=\"https:\/\/archive.brucon.org\/2024\/brucon-2023-training\/deep-dive-into-fuzzing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Read More<\/a>[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69eb2ae9c09055153 .gem-button svg {fill: #ffffff;}.thegem-button-69eb2ae9c09055153 .gem-button:hover svg {fill: #ffffff;}<\/style><div class=\"gem-button-container gem-button-position-fullwidth thegem-button-69eb2ae9c09055153    \"  ><a class=\"gem-button gem-button-size-giant gem-button-style-flat gem-button-text-weight-normal\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 3px;background-color: #b43836;color: #ffffff;\" onmouseleave=\"this.style.backgroundColor='#b43836';this.style.color='#ffffff';\" onmouseenter=\"this.style.backgroundColor='#ef5047';this.style.color='#ffffff';\" href=\"https:\/\/brucon-0x0f-spring-training.eventbrite.co.uk\" target=\"_self\">Buy Training Ticket<\/a><\/div> [\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<\/div>[\/vc_column_text][vc_empty_space height=&#8221;200px&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Conference Tickets [\/vc_column_text][vc_column_text] TICKET SALE STARTS ON JUne 1st at 5 PM CET [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text][\/vc_column_text][vc_message message_box_color=&#8221;pink&#8221; icon_fontawesome=&#8221;fas fa-exclamation-triangle&#8221;]The 15th of July at 5 PM CEST sharp, a (probably last) batch of business tickets will be made available.[\/vc_message][vc_message]Conference tickets sold out ? If there are no more conference tickets available, you can always consider purchasing a training ticket which will always allow you to purchase a conference ticket as well. Check out the training page for&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/pages\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":73,"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":3845,"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/pages\/6\/revisions\/3845"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2024\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}