TRAININGS

Hacking Extreme – Special Edition

Training

Hacking Extreme – Special Edition

Instructors:  Marco Lorenz and Christopher Dreher

Content:
You can achieve the best level of security if you know the attackers, have mastered their methods and tools and can understand their way of thinking and their motives. Security mechanisms (firewalls, IDS, etc.) are often planned and developed from only the perspective of an administrator or network specialist. However, the way an attacker view things is normally fundamentally different, which is why company networks can be successfully attacked time and time again. This intensive training course will convey in a very practice-oriented style the manner in which attackers proceed as well as well-known and not so well-known techniques of attacking, supplemented by numerous lab exercises. Participants will have access to notebooks with tools and exploits galore, much more than the usual scanner. We will be using Windows and Unix operating systems as platforms and target systems.
The trainers themselves carry out security checks on a regular basis and will pass on their own unfiltered practical experience and insider knowledge obtained on the "scene".

Examples of topics covered:

  • Traditional and advanced scanning techniques
  • Firewall and IDS evading
  • Load balancer spotting
  • Traffic analysis
  • Attacks against SSH and SSL
  • Recognizing operating systems and architecture (active and passive techniques)
  • Reverse engineering
  • Collecting and evaluating service-related information
  • Spoofing (in a switched environment)
  • Sniffing (in a switched environment)
  • Hijacking session (in a switched environment)
  • Man in the middle (in a switched environment)
  • Targeted exploitation of badly configured services
  • Buffer overflows (causes, functionality and description of concrete exploit examples)
  • Format string vulnerabilities (causes, functionality and description of concrete exploit examples)
  • Race conditions (causes, functionality and description of concrete exploit examples)
  • Password cracking
  • Backdoors (remote/local)
  • Host hopping
  • Website defacements
  • Rootkits (traditional, LKMs)
  • Logfile manipulation
  • IIS-related vulnerabilities
  • Win32-API vulnerabilities
  • LM, NTLM, NTLMv2 vulnerabilities
  • DLL injection
  • Named pipe vulnerabilities
  • Vulnerabilities in the Windows Message Service
  • ...

 Operating systems covered: Unix and Windows

Target group:
Administrators and security officers who are not afraid to view security through the eyes of attackers, diving deep into their world.

Prerequisite:
So that all the contents described in the training course are clearly comprehensible, you should be familiar with the basic procedures involved in using and administrating a Windows and Unix system as well as the functionality of the individual communication protocols of the TCP protocol family. Any knowledge of programming would be a plus but is not absolutely necessary.

Price: 2,000,- Euro

Date: February 2nd to 3rd 2014 - the two days before IT-Defense conference.

The training is conducted in the German language by two experienced trainers.

For the participation at the training Hacking Extreme you get CPE Points. The training takes 16hours.

Information to our regular dates of the training "Hacking Extreme" and further Information you find here

Location:
The Westin Leipzig Hotel
Gerberstrasse 15
04105 Leipzig
Tel.: +49 341 988-0
Fax: +49 341 988-1229
info(at)westin-leipzig.com
www.westin-leipzig.com