Search results
From BruCON 2016
Create the page "Training 5" on this wiki! See also the search results found.
- BruCON Spring Trainings will be between 20 and 22 April 2016. Our regular training track will be hosted between 24 and 26 October followed by our conference o <rss>http://blog.brucon.org/feeds/posts/default|max=5|date</rss>5 KB (691 words) - 14:23, 8 October 2016
- ...enance interfaces), control system protocols (modbus, DNP3, IEC 60870-‐5-‐104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''10 KB (1,421 words) - 22:00, 29 August 2015
- == Training location == From there, you're a mere 5 minutes walk away from the con.6 KB (1,006 words) - 14:34, 15 March 2016
- ...pentesters the ability to assess the security of these smart devices. The training will cover assessing IoT attack surfaces and finding security issues. The c ...or pentesters who want to kickstart their career in IoT Pentesting and the training does not expect the attendees to have a prior knowledge of assembly, mobile5 KB (776 words) - 11:54, 26 May 2015
- ...'t be surprised if you are offered a complimentary beer at the end of each training day. ...is in the field. This class prepares you for the Advanced Malware Analysis training that will be offered this Fall at Brucon.3 KB (483 words) - 20:23, 25 April 2015
- ''Mon. 5 - 7 October 2015 (09:00 - 17:00)'' [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]2 KB (294 words) - 21:52, 28 April 2015
- ...b network to which attendees will have Free access for one month after the training. The class consists of hands-on, challenges and demonstrations. ...Kernel Exploitation by Ashfaq Ansari]] '''(3-day training) - In this 3-day training course, you'll learn to fuzz Windows Kernel Mode driver and find vulnerabil5 KB (704 words) - 21:18, 20 June 2016
- ...cent career change, Russ Gideon has been replaced with Colin Ames for this training. ''Mon. 5 - 7 October 2015 (09:00 - 17:00)''5 KB (673 words) - 21:43, 29 August 2015
- This training is based on the best selling book “Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-de During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out a3 KB (396 words) - 11:35, 25 August 2014
- ...of the greatest companies? If that sounds interesting, join this hands-on training! ...g into detail and doing manual/semi-automated analysis, then this hands-on training is for you.4 KB (555 words) - 15:10, 24 June 2015
- =Wireshark Wifi training= ...i traffic on Windows machines. You can keep this AirPcap adapter after the training.9 KB (1,379 words) - 22:39, 9 September 2015
- ...ng on exploiting mobile applications for the iOS and Android platform. The training is based on exploiting Damn Vulnerable iOS app and other vulnerable apps wh ...will get a PDF presentation with all the slides, vulnerable apps used for training, sample source code and all the necessary tools used to pentest mobile appl6 KB (786 words) - 15:02, 4 April 2016
- ...maintenance interfaces), control system protocols (modbus, DNP3, IEC 60870-5-104), RF communications (433MHz, 869MHz, 915MHz), and embedded circuit atta [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]11 KB (1,531 words) - 09:03, 1 October 2016
- In this training, our resident trainer Didier will teach you how to use Microsoft Office for ...anguage. They do this to learn new skills and boost their creativity. This training is an exercise in style for penetration testers and hackers; the goal is to5 KB (702 words) - 09:37, 16 August 2016
- =Hardware hacking training with Hardsploit= ...g both theory and practice (hands-on). It follows a simple (but efficient) training methodology based on a "Discover / Analyze / Attack & Protect" guideline th5 KB (731 words) - 21:08, 20 June 2016