Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to The Eighth Annual Information Security Summit presented by ISSA Los Angeles
View analytic
Thursday, May 19 • 9:00am - 5:00pm
Training - Real World Red Team Attacks

Sign up or log in to save this to your schedule and see who's attending!

The days of exploiting MS08-067, encoding with Shikata Ga Nai, and blindly scanning are gone.  Both Blackhat hackers and pentesters alike have shifted to using more advanced techniques to bypass AV, implement a smaller footprint to evade SIEM detection, and continually stay persistent to devastate enterprise networks.  If you are looking to take your craft to the next level, this is the primer course for you.

Written and taught by the author of “The Hacker Playbook” series, Peter Kim will take you through an immensely hands-on experience to replicate real world attacks without even running a single vulnerability scanner.  In this hands-on experience, you will take on the role of a malicious Blackhat attacker and infiltrate your way into a corporate network.  The onsite lab will emulate a real network using only modern operating systems.

Student Requirements:

  • Should have an intermediate understanding of Windows and Linux
  • Some experience with penetration testing techniques and tools (Metasploit)

Students will be required to provide their own computer with the following specifications:

  • Laptop with administrator access
  • Laptop with wireless/network connection
  • Laptop capable of running two virtual machines simultaneously using either VMware Workstation or Player or Fusion (for OS X)
  • Laptop with 30GB of free disk space

What Students will be provided with:

  • USB Stick with Custom VM Image
  • Custom code for exploitation/lateral movement
  • Course documentation
  • Free signed copy of The Hacker Playbook 2!

Speakers

Thursday May 19, 2016 9:00am - 5:00pm
Club Room

Attendees (22)