SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • == Training locations == ...k below for discount registrations). Hotels are within walking distance (< 1 minute) of each other.
    8 KB (1,153 words) - 14:32, 11 July 2017
  • Along with the training knowledge, the course also aims to impart the technical know-how methodolog == Day 1 ==
    8 KB (1,077 words) - 16:06, 6 June 2017
  • This training will teach you how to analyse PDF files and MS Office files (both “old” To get a better idea of the training, you can also view the following YouTube videos Didier produced:
    4 KB (542 words) - 23:39, 16 December 2015
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ...the world of pen testing and application security by attending the BruCON Training. ...October (before the conference) offering world-class, deep-dive technical training given by '''the most recognised experts''' with huge industry experience in
    8 KB (1,243 words) - 12:41, 18 August 2017
  • In this training you will learn to analyse and create malicious documents. PDF exploits and This training will teach you how to analyse MS Office files (both “old” OLE and “ne
    5 KB (704 words) - 17:07, 20 February 2017
  • On day two, the training will dive a bit further into practical bug hunting, reverse engineering met * This training course has a strong emphasis on the Android platform, so an actual Android
    4 KB (534 words) - 08:27, 5 September 2013
  • This training will teach you how to analyze PDF files and create your own PDF hacks. PDF This is not a training on exploit development, but we will see with several exercises how exploits
    3 KB (467 words) - 08:27, 5 September 2013
  • Day 1: [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (431 words) - 08:27, 5 September 2013
  • '''Day 1 – Pentesting SCADA Network Protocols''' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    9 KB (1,234 words) - 08:27, 5 September 2013
  • 1. For those with little or no ICS experience, these Wikipedia articles ===Day 1 – Pentesting ICS Network Protocols===
    9 KB (1,301 words) - 09:18, 28 January 2014
  • This training is based on the best selling book “Backtrack 5 Wireless Penetration Testi During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a
    3 KB (396 words) - 11:35, 25 August 2014
  • ...rotocols, standardized and proprietary telecom Core Network protocols. The training will show the various attack surfaces for these networks and show the impac ===Day 1===
    3 KB (478 words) - 11:49, 6 August 2014
  • =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.
    9 KB (1,379 words) - 22:39, 9 September 2015
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (932 words) - 20:42, 29 May 2016
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (935 words) - 20:55, 29 May 2016
  • In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to
    5 KB (702 words) - 09:37, 16 August 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016
  • A completely hands-on training on exploiting mobile applications for the iOS and Android platform. Even wo ...ited well for both beginners as well as advanced security enthusiasts. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2
    8 KB (1,075 words) - 17:18, 20 February 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)