SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • == Training locations == ...ourses are spread over two locations. More information can be found on our training page. for accommodation, we recommend the Novotel (see link below for disco
    8 KB (1,153 words) - 14:32, 11 July 2017
  • Along with the training knowledge, the course also aims to impart the technical know-how methodolog ===Module 3: CI Tools===
    8 KB (1,077 words) - 16:06, 6 June 2017
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ...the world of pen testing and application security by attending the BruCON Training. ...October (before the conference) offering world-class, deep-dive technical training given by '''the most recognised experts''' with huge industry experience in
    8 KB (1,243 words) - 12:41, 18 August 2017
  • In this training you will learn to analyse and create malicious documents. PDF exploits and This training will teach you how to analyse MS Office files (both “old” OLE and “ne
    5 KB (704 words) - 17:07, 20 February 2017
  • '''Day 3 – Pentesting SCADA Field and Floor Devices Continued''' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    9 KB (1,234 words) - 08:27, 5 September 2013
  • ...niques from an experienced exploit developer, at a conference. During this 3 day course, students will be able to learn all ins and outs about writing r ...elves. Combined with the way the course is built up, this will turn these 3 days into a truly unique experience.
    9 KB (1,415 words) - 09:18, 28 January 2014
  • 3. http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628_vol3.pdf - Cha ===Day 3 – Pentesting ICS Field and Floor Devices Continued===
    9 KB (1,301 words) - 09:18, 28 January 2014
  • This training is based on the best selling book “Backtrack 5 Wireless Penetration Testi During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a
    3 KB (396 words) - 11:35, 25 August 2014
  • This training deals with performing digital forensics with open source tools on Windows a * Digital Forensics with Open Source tools is a training which aims to present only open source tools used at each step of an invest
    3 KB (492 words) - 10:59, 8 September 2014
  • ...courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploit development ! Lunch and dinn ...d techniques from an experienced exploit developer. During this (typically 3 ‘long’ day) course, students will be able to learn all ins and outs abo
    8 KB (1,300 words) - 22:02, 17 February 2016
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...etration testers the ability to assess the security of smart devices. The training will cover assessing IoT attack surfaces and finding security issues with h The training will cover assessing IoT attack surfaces and finding security issues. The c
    6 KB (849 words) - 23:36, 16 December 2015
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (932 words) - 20:42, 29 May 2016
  • ...ftware vulnerabilities along with their exploitation in Kernel mode. These 3 days will be full of hands-on, kernel debugging and WinDbg-Fu. This training is focused on exploitation of different Windows Kernel Mode vulnerabilities
    5 KB (635 words) - 22:07, 27 July 2016
  • ...home with your own PLC and a set of hardware/RF hacking tools?!? In this 3-day version of the course, you will receive all six days worth of slides. ''Mon. 24 - 26 October 2016 (09:00 - 17:00) (3-day)''
    11 KB (1,531 words) - 09:03, 1 October 2016
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (935 words) - 20:55, 29 May 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016
  • ...courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploit development ! Lunch and dinn [[File:Corelan_bootcamp-3.png|thumb|100px]]
    9 KB (1,425 words) - 17:12, 20 February 2017
  • A completely hands-on training on exploiting mobile applications for the iOS and Android platform. Even wo ...ited well for both beginners as well as advanced security enthusiasts. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2
    8 KB (1,075 words) - 17:18, 20 February 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)