SEARCH
TOOLBOX
LANGUAGES
Search results

Search results

From BruCON 2016

Jump to: navigation, search
  • BruCON Spring Trainings will be between 20 and 22 April 2016. Our regular training track will be hosted between 24 and 26 October followed by our conference o <rss>http://blog.brucon.org/feeds/posts/default|max=5|date</rss>
    5 KB (691 words) - 14:23, 8 October 2016
  • ...enance interfaces), control system protocols (modbus, DNP3, IEC 60870-­‐5-­‐104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''
    10 KB (1,421 words) - 22:00, 29 August 2015
  • == Training location == From there, you're a mere 5 minutes walk away from the con.
    6 KB (1,006 words) - 14:34, 15 March 2016
  • ...pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The c ...or pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile
    5 KB (776 words) - 11:54, 26 May 2015
  • ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.
    3 KB (483 words) - 20:23, 25 April 2015
  • ''Mon. 5 - 7 October 2015 (09:00 - 17:00)'' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    2 KB (294 words) - 21:52, 28 April 2015
  • ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations. ...Kernel Exploitation by Ashfaq Ansari]] '''(3-day training) - In this 3-day training course, you'll learn to fuzz Windows Kernel Mode driver and find vulnerabil
    5 KB (704 words) - 21:18, 20 June 2016
  • ...cent career change, Russ Gideon has been replaced with Colin Ames for this training. ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''
    5 KB (673 words) - 21:43, 29 August 2015
  • This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-de During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a
    3 KB (396 words) - 11:35, 25 August 2014
  • ...of the greatest companies? If that sounds interesting, join this hands-on training! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.
    4 KB (555 words) - 15:10, 24 June 2015
  • =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.
    9 KB (1,379 words) - 22:39, 9 September 2015
  • ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl
    6 KB (786 words) - 15:02, 4 April 2016
  • ...maintenance interfaces), control system protocols (modbus, DNP3, IEC 60870-5-104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit atta [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
    11 KB (1,531 words) - 09:03, 1 October 2016
  • In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to
    5 KB (702 words) - 09:37, 16 August 2016
  • =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th
    5 KB (731 words) - 21:08, 20 June 2016