AbstractTwo days of happy hacking joy, learning by doing hands-on labs learning and attacking. A smile will spread across your face as you explore weaknesses in IT systems, applications and web apps, IoT devices, protocols and ICS/SCADA systems. If the ever-connected world gives you vulnerable targets, hack all the things. The OWASP Top Ten will be the focus over a variety of different types of vulnerabilities from a hacker perspective, moving beyond the white hat tester mentality. Threat modelling Underground economies and markets where intellectual property and data are sold.
Discussing the reality of the economic consequences of exploitable technology from terrorism to cyber warfare. Who knew software vulnerabilities could lead to some crazy nation on nation shi*t? You'll learn how to find some serious issues and exploit that code so hard the original developer or vendor will feel it.
You’ll jump right in and learn with a customized Kali pen testing operating system. Using OWASP ZAP,
BeEF, Metasploit, Nmap, Recon NG, Nessus, Nikto, Maltego, Shodan, Censys, alternative search
engines, OSINT, SpiderFoot and metadata tools. Finding exploitable systems, scanning, sniffing for
credentials, XSS reflected and stored attacks, attacking browsers via JavaScript, SQL injection, CSRF,
data leaks, replay attacks, exploiting vulnerable operating systems, applications, websites, embedded
systems and critical infrastructure ICS/SCADA. How attackers cover their tracks and take advantage of
insufficient logging and monitoring. How attackers discover then pivot from one weak system to
another, burrowing deep into an organisation to steal intellectual property, data or anything of juicy
value.
Expectations and GoalsDiscover vulnerabilities, data leaks, insecure systems and devices using the tools and techniques in the
course.
Approach technology and security controls from an attacker and black hat hacker perspective.
Understand the OWASP Top Ten and threat modeling with IT, IOT and ICS/SCADA systems.
Recognize patterns in observations of weak and risky systems and applications and construct threat
models to explain the jeopardy.
Required MaterialsAttendees must bring a curious mind and some technology. Caution, using a Windows 10 host operating
system can sometimes be problematic due to various auto-protection mechanisms in place by
Microsoft. Mac/Apple operating systems can be used as a host but try to use the VM Fusion 64-bit
version.
- Laptop with administrative privileges and 8 GB of RAM with 100 GB hard disk free
- Installation of VM Ware Player or Fusion
- Network connection, RJ45 and can be a USB to RJ45
- API keys and accounts setup in advance for the course
- Bring your own hoodie
Optional MaterialsWant to add more tables to your document that look like the Course Schedule and Exam Schedule
tables that follow? Nothing could be easier. On the Insert tab, just select Table to add a new table.
New tables you create in this template are automatically formatted to match.
Required TextOWASP Version 4 Testing Guide PDF, OWASP (Free)
Course Workbook (Provided) Print, Chris Kubecka
Hack the World with OSINT (Provided)
Course Schedule (Tentative)Day 2[Topics]
Scanning
OWASP #1 Injections
OWASP #2 Broken Authentication
OWASP #3 Sensitive Data Disclosure
OWASP #4 Security Misconfiguration
[Exercises]
Using scanning tools against targets
Hands-on SQL and other injection attack
Upon Completion of this training, attendees will knowHow attackers cover their tracks and take advantage of insufficient
logging and monitoring
How attackers discover then pivot from one weak system to another,
burrowing deep into an organization to steal intellectual property,
data or anything of juicy value
Basic understanding of IT/ IOT/ ICS protocols
Web application testing from a sophisticated attacker point of view
Nation-state attack techniques and tools