Events Search and Views Navigation
Abstract DNS is the one of the basic layers that holds the Internet together. Without it, not much else works... even malware. In this training we will focus on how to use DNS to the advantage of defending networks. With good techniques it is possible to find a great deal of misuse based on DNS such as DGAs, fast/double flux networks, phishing, and brand impersonation. Tools like passive DNS, whois, and active probing allow defenders to proactively search for malicious…Find out more »
Abstract This course is an introduction to the basics of ethical hacking. It covers most of the aspects one requires to get started in this ﬁeld. It has been created for students with limited to no prior experience with ethical hacking. This course, while remaining ethical in its approach, will ensure that students understand and are able to get from the perimeter right into the heart of networks and systems. This very exciting hacking course will take each student through…Find out more »
Abstract This is the essential course on ModSecurity and the OWASP Core Rule Set (CRS). There are more than ten years of experience with practical ModSecurity in high security setting in this course. The teacher is one of the co-leads of the CRS project, author of the 2nd ed. of the ModSecurity Handbook and the best known instructor on the subject. Intended Audience This course is aiming at security engineers, SecDevOps people and those interested in web application firewalls. Pre-requisites…Find out more »
Abstract This workshop is an advanced workshop for Reverse Engineers who want to expand their horizons and skills on Reversing C++ Programs.C++ Binaries are full of mysteries, they have objects, inheritance, templates, vtables and many more.The workshop will try to make reverse engineering of C++ programs easier by explaining advanced C++ topics.We will start with how to identify C++ Objects and Inheritance in a binary and how to represent them in IDA, next we will study work methods and design patterns…Find out more »
Abstract The Unified Extensible Firmware Interface (UEFI) plays a critical role in ensuring platform security. However, there seems to be a steep learning curve for developers and researchers to implement firmware functionality. This course intends to be a resource for firmware enthusiasts to ease into developing interesting platform functionality as well as to provide them with the tools necessary to test the state of a platform and the firmware running on it. The class is a hands-on course focused on…Find out more »
Abstract PowerShell has evolved greatly in the last decade to become the tool of choice for Windows Post-Exploitation by many (see IBM on PS Attacks peaking at 57%). Indeed, with great power(shell) comes great responsibility. PowerShell has come a long way, and is the main enabler of Microsoft's management efforts & future, both on premise and in the cloud. Yet in the "living of the land" reality, where any admin tool can be used as an attack tool, PowerShell is…Find out more »
Training Terms & Conditions
- Training requires a minimum of 10 participants and no more than 25 per classroom.
- Training session confirmation will be sent June 1st 2019.
- Cancellation and refunds will not be available once session has been confirmed.
- Questions? [email protected]
- Full terms can be found at https://bsidestlv.com/trainingterms/