SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2017

Jump to: navigation, search
  • ...between '''19 and 21 April 2017'''. Our regular training track is from '''2 until 4 October''' 2017. The conference will be on '''5 and 6 October 2017' * '''[[Training]] - BruCON training program'''
    5 KB (697 words) - 10:21, 3 October 2017
  • ===BruCON Training Track=== ...e conference to announce the possibility to follow first class training on 2-4 October.
    3 KB (466 words) - 11:47, 29 May 2017
  • == Training locations == ...ourses are spread over two locations. More information can be found on our training page. for accommodation, we recommend the Novotel (see link below for disco
    8 KB (1,153 words) - 14:32, 11 July 2017
  • ...iners, Big Data Environments, Search Technologies and Message Brokers. The 2 days course is a fast paced and completely hands on program that aims to im In this 2 day course we start by looking into red team tactics for pentesting modern
    8 KB (1,077 words) - 16:06, 6 June 2017
  • ...ious PDF or MS Office documents using his own created Phyton tools in this 2-day course! This training will teach you how to analyse PDF files and MS Office files (both “old”
    4 KB (542 words) - 23:39, 16 December 2015
  • ...pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The c ...or pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile
    5 KB (776 words) - 11:54, 26 May 2015
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ...en 19 and 21 April 2017. Our regular training track will be hosted between 2 and 4 October followed by our conference on 5 and 6 October 2017.
    13 KB (2,068 words) - 11:48, 27 April 2017
  • ...the world of pen testing and application security by attending the BruCON Training. ...October (before the conference) offering world-class, deep-dive technical training given by '''the most recognised experts''' with huge industry experience in
    8 KB (1,243 words) - 12:41, 18 August 2017
  • In this training you will learn to analyse and create malicious documents. PDF exploits and This training will teach you how to analyse MS Office files (both “old” OLE and “ne
    5 KB (704 words) - 17:07, 20 February 2017
  • Student machines must be able to run at least 2 virtual machines utilizing VMware Workstation 8.0 and above (which can be o ...cent career change, Russ Gideon has been replaced with Colin Ames for this training.
    5 KB (673 words) - 21:43, 29 August 2015
  • On day two, the training will dive a bit further into practical bug hunting, reverse engineering met * At least one free USB 2.0 port
    4 KB (534 words) - 08:27, 5 September 2013
  • This training will teach you how to analyze PDF files and create your own PDF hacks. PDF This is not a training on exploit development, but we will see with several exercises how exploits
    3 KB (467 words) - 08:27, 5 September 2013
  • During the 2 days course, the attendees will have access to a number of challenges for e [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (452 words) - 08:27, 5 September 2013
  • Day 2: [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (431 words) - 08:27, 5 September 2013
  • '''Day 2 – Pentesting SCADA Field and Floor Devices''' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    9 KB (1,234 words) - 08:27, 5 September 2013
  • ...ments that makes this training stand out between other exploit development training offerings. Feel free to check our testimonials page if you want to see re Finally, we offer you post-training support as well. If you have taken the course and you still have question
    9 KB (1,415 words) - 09:18, 28 January 2014
  • Student machines must be able to run at least 2 virtual machines [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    3 KB (497 words) - 09:18, 28 January 2014
  • 2. http://nostarch.com/xboxfree - While this has nothing to do with control s ===Day 2 – Pentesting ICS Field and Floor Devices===
    9 KB (1,301 words) - 09:18, 28 January 2014
  • ...rotocols, standardized and proprietary telecom Core Network protocols. The training will show the various attack surfaces for these networks and show the impac ===Day 2===
    3 KB (478 words) - 11:49, 6 August 2014
  • =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.
    9 KB (1,379 words) - 22:39, 9 September 2015
  • ...! One of the best exploit development courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploi ...other exploit development training offerings. Finally, we offer you post-training support as well. If you have taken the course and you still have question
    8 KB (1,300 words) - 22:02, 17 February 2016
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...etration testers the ability to assess the security of smart devices. The training will cover assessing IoT attack surfaces and finding security issues with h The training will cover assessing IoT attack surfaces and finding security issues. The c
    6 KB (849 words) - 23:36, 16 December 2015
  • ...t companies? If that sounds interesting, join this unique two-day hands-on training! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    5 KB (652 words) - 23:35, 16 December 2015
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (932 words) - 20:42, 29 May 2016
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations This training is aimed towards attacking Windows network using PowerShell and is based on
    7 KB (935 words) - 20:55, 29 May 2016
  • ...t companies? If that sounds interesting, join this unique two-day hands-on training! This course was sold out last year, so we are bringing it back this year! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    4 KB (602 words) - 15:01, 1 June 2016
  • In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to
    5 KB (702 words) - 09:37, 16 August 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016
  • ...! One of the best exploit development courses available, now in our spring training track. Prepare yourself for 3 long days (+10 hours/day) of intensive exploi ''We will be hosting the Advanced course in October (2 - 4 October 2017) and you can now already register for both!''
    9 KB (1,425 words) - 17:12, 20 February 2017
  • A completely hands-on training on exploiting mobile applications for the iOS and Android platform. Even wo ...ited well for both beginners as well as advanced security enthusiasts. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2
    8 KB (1,075 words) - 17:18, 20 February 2017
  • After our [[Spring Training 2017 - Corelan Bootcamp|Corelan Bootcamp Spring Training in April]], Corelan will host the Advanced course in October ! The Corelan ...elopment training offerings. Feel free to check our [https://www.corelan-training.com/index.php/testimonials/ testimonials page] if you want to see real, vol
    8 KB (1,272 words) - 17:10, 7 June 2017
  • =Open Source Defensive Security Training= Open Source Defensive Security Training is a 3-days long, advanced IT Security laboratory dedicated for professiona
    11 KB (1,501 words) - 17:27, 20 February 2017
  • The focus of this training is on the offensive and dangerous parts of HTML, JavaScript and related tec ...ll attendees will be receive updated material even months after the actual training. All attendees are granted perpetual access to updated slides and material.
    4 KB (581 words) - 15:43, 6 June 2017
  • This training is aimed towards attacking Windows network using PowerShell and is based on ...and customize existing ones for security testing after this training. This training aims to change how you test a Windows based environment.
    7 KB (1,044 words) - 11:48, 8 June 2017
  • ...tacks that you would have never thought of before. Upon completion of this training, participants will be able to: == Day 2 ==
    7 KB (1,099 words) - 16:36, 9 June 2017
  • '''This is the most requested training according to our previous students, so we had to bring him back !''' The de This training is focused on exploitation of different Windows Kernel Mode vulnerabilities
    8 KB (1,167 words) - 15:05, 1 July 2017
  • In this training students will dive headfirst, immersing themselves, into a pool of delibera ''Mon. 2 - 3 October 2017 ('''09:00 - 17:00''') (2-day) - NH Gent Belfort''
    5 KB (758 words) - 09:54, 7 June 2017
  • The aim of this training is to help teams in searching, analyzing and performing various kinds of in ''Mon. 2 - 3 October 2017 ('''09:00 - 17:00''') (2-day) - NH Gent Belfort''
    3 KB (495 words) - 16:10, 8 June 2017
  • ...cker can get access to the device and retrieve sensitive information. This training will show you how to conduct a wide range of penetration tests on iOS appli ...help you to understand the security measures which needs to be taken. This training will also have CTF challenge where attendees will use their skills learnt i
    825 bytes (139 words) - 21:12, 5 July 2017