SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.
    9 KB (1,379 words) - 22:39, 9 September 2015
  • ...! One of the best exploit development courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploi ...other exploit development training offerings. Finally, we offer you post-training support as well. If you have taken the course and you still have question
    8 KB (1,300 words) - 22:02, 17 February 2016
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...etration testers the ability to assess the security of smart devices. The training will cover assessing IoT attack surfaces and finding security issues with h The training will cover assessing IoT attack surfaces and finding security issues. The c
    6 KB (849 words) - 23:36, 16 December 2015
  • ...t companies? If that sounds interesting, join this unique two-day hands-on training! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    5 KB (652 words) - 23:35, 16 December 2015
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (932 words) - 20:42, 29 May 2016
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (935 words) - 20:55, 29 May 2016
  • ...t companies? If that sounds interesting, join this unique two-day hands-on training! This course was sold out last year, so we are bringing it back this year! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    4 KB (602 words) - 15:01, 1 June 2016
  • In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to
    5 KB (702 words) - 09:37, 16 August 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016
  • ...! One of the best exploit development courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploi ''We will be hosting the Advanced course in October (2 - 4 October 2017) and you can now already register for both!''
    9 KB (1,425 words) - 17:12, 20 February 2017
  • A completely hands-on training on exploiting mobile applications for the iOS and Android platform. Even wo ...ited well for both beginners as well as advanced security enthusiasts. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2
    8 KB (1,075 words) - 17:18, 20 February 2017
  • After our [[Spring Training 2017 - Corelan Bootcamp|Corelan Bootcamp Spring Training in April]], Corelan will host the Advanced course in October ! The Corelan ...elopment training offerings. Feel free to check our [https://www.corelan-training.com/index.php/testimonials/ testimonials page] if you want to see real, vol
    8 KB (1,272 words) - 17:10, 7 June 2017
  • =Open Source Defensive Security Training= Open Source Defensive Security Training is a 3-days long, advanced IT Security laboratory dedicated for professiona
    11 KB (1,501 words) - 17:27, 20 February 2017
  • The focus of this training is on the offensive and dangerous parts of HTML, JavaScript and related tec ...ll attendees will be receive updated material even months after the actual training. All attendees are granted perpetual access to updated slides and material.
    4 KB (581 words) - 15:43, 6 June 2017
  • This training is aimed towards attacking Windows network using PowerShell and is based on ...and customize existing ones for security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (1,044 words) - 11:48, 8 June 2017
  • ...tacks that you would have never thought of before. Upon completion of this training, participants will be able to: == Day 2 ==
    7 KB (1,099 words) - 16:36, 9 June 2017
  • '''This is the most requested training according to our previous students, so we had to bring him back !''' The de This training is focused on exploitation of different Windows Kernel Mode vulnerabilities
    8 KB (1,167 words) - 15:05, 1 July 2017
  • In this training students will dive headfirst, immersing themselves, into a pool of delibera ''Mon. 2 - 3 October 2017 ('''09:00 - 17:00''') (2-day) - NH Gent Belfort''
    5 KB (758 words) - 09:54, 7 June 2017
  • The aim of this training is to help teams in searching, analyzing and performing various kinds of in ''Mon. 2 - 3 October 2017 ('''09:00 - 17:00''') (2-day) - NH Gent Belfort''
    3 KB (495 words) - 16:10, 8 June 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)