Difference between revisions of "Training Offensive"
From BruCON 2016
m (Protected "Training Offensive" ([edit=sysop] (indefinite) [move=sysop] (indefinite))) |
(→Offensive Techniques by Russ Gideon) |
||
Line 1: | Line 1: | ||
=Offensive Techniques by Russ Gideon= | =Offensive Techniques by Russ Gideon= | ||
− | In the professional information security world, there has yet to be a course which provides the | + | <!--In the professional information security world, there has yet to be a course which provides the |
students the knowledge and skills to carry out a real world attack. Traditional penetration | students the knowledge and skills to carry out a real world attack. Traditional penetration | ||
testing courses impart only a limited view of the exposure and vulnerabilities companies suffer | testing courses impart only a limited view of the exposure and vulnerabilities companies suffer | ||
Line 101: | Line 101: | ||
** Token Hijacking | ** Token Hijacking | ||
* Domain Enumeration | * Domain Enumeration | ||
+ | |||
+ | =Trainer Biography= | ||
+ | [[File:Attack-Research-Logo.jpg|190px|thumb|left]] '''Russ Gideon''' has many years of experience in information security fulfilling many diverse roles from | ||
+ | being a core component of an Incident Response operation to managing an effective Red Team. | ||
+ | Russ excels both at malware reverse engineering, which enables him to deeply understand how | ||
+ | the attackers do what they do, as well as at high end Red Teaming where he has to penetrate | ||
+ | sophisticated and well protected high value systems. Russ currently serves as the Director of | ||
+ | Malware Research at Attack Research, LLC. | ||
+ | |||
+ | More information is available on [http://carnal0wnage.attackresearch.com carnal0wnage] | ||
+ | |||
+ | [[Image:300px-twitter-icon.jpg|17px]] [https://twitter.com/#!/attackresearch @attackresearch] | ||
+ | |||
+ | [http://www.attackresearch.com http://www.attackresearch.com] | ||
+ | |||
+ | [[File:Attack-Research-Logo.jpg|190px|thumb|left]] '''Dave Sayre''' has worked in the computer security area for the past ten years. He has specialized in reverse engineering, malware research, and penetration testing. He is currently a researcher at Attack Research. Dave specializes on *nix systems and enjoys figuring out how to abuse various trust relations between *nix systems.--> | ||
+ | |||
+ | <br><br><br><br><br><br><br><br><br><br><br> | ||
+ | ''23 - 25 April (09:00 - 17:00)'' | ||
+ | |||
+ | [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]] | ||
+ | |||
+ | [[Training|Back to Training Overview]] | ||
=Trainer Biography= | =Trainer Biography= |
Revision as of 17:30, 9 December 2013
Offensive Techniques by Russ Gideon
23 - 25 April (09:00 - 17:00)
Trainer Biography
Russ Gideon has many years of experience in information security fulfilling many diverse roles frombeing a core component of an Incident Response operation to managing an effective Red Team. Russ excels both at malware reverse engineering, which enables him to deeply understand how the attackers do what they do, as well as at high end Red Teaming where he has to penetrate sophisticated and well protected high value systems. Russ currently serves as the Director of Malware Research at Attack Research, LLC.
More information is available on carnal0wnage
Dave Sayre has worked in the computer security area for the past ten years. He has specialized in reverse engineering, malware research, and penetration testing. He is currently a researcher at Attack Research. Dave specializes on *nix systems and enjoys figuring out how to abuse various trust relations between *nix systems.
23 - 25 September (09:00 - 17:00)