Time
Workshop
Time
Workshop
FRI 11/18
9AM-1PM
Pwning Web Apps – Phillip Wylie
In this intro to web application penetration testing workshop, participants will learn the basics of web application penetration testing including; methodology, tools, techniques, and resources. The skills taught in this workshop are valuable to aspiring bug hunters for use in bug bounties.
FRI 11/18
1PM-4PM
Intro to Pickpocket Sleight of Hand – James Harrison
James Harrison is a pick pocket magician out of Canada who recently spoke at the DEF CON Rogue Village discussing how pickpocketing works, how to perform certain techniques for approved red team exercises or for entertainment, and how to protect yourself from malicious pickpockets.
During the workshop:
Hands on how-to for the sleight of hand for pickpocketing
How pickpocketing works
Specific techniques
Why specific techniques work
Practice pickpocketing in a safe environment with a professional
Practices to defend yourself and your items from pickpocketing
You can check out a video of James on The Modern Rogue here – https://www.youtube.com/watch?v=ejHX2VBykbA
FRI 11/18
9AM-1PM
Tracing Transactions: Threat Hunting for Financially Motivated APTs – Brandon DeVault
You’ve got a secure environment and alerting in-place, yet the adversaries are still able to bypass your defenses. How do you find and stop the adversary before they are able to compromise your environment?
In this workshop we’ll explore through a real-world attack chain from FIN7 and showcase strategies on how to hunt for specific techniques. This workshop focuses on network analysis and covers the following topics:
– SMTP Email Header Analysis
– Bidirectional C2 using legitimate cloud services
– Lateral Movement with RDP and SSH
– Exfiltration using cloud storage
We’ll be using open-source tools like Zeek and Elasticsearch so we can really focus on the methodology and hunting for the behaviors. And hopefully, you’ll leave this workshop with some new skills for network threat hunting. I’ll also be releasing some threat hunting focused dashboards you can use in your own environment.
FRI 11/18
1PM-4PM
Incident Response Tabletop – Evan Wagner
The training will begin with a short real world tabletop scenario exercise to set the scene for performing an IR escalation. After that there are 13 other modules to explore which have associated VMs to perform the steps.
These include: – Using MISP to explore and gather threat intelligence
– Using Iris for Case Management
– Performing manual triage operations on a machine mentioned in the tabletop exercise which have active C2 infection
– Building an automated enterprise telemetry triage collection package using KAPE and Velociraptor to
execute remotely against multiple machines mentioned in the tabletop exercise
– Analyzing the triage collection data to determine the actions which led to the infection
– Identifying the persistence mechanism used
– Identifying lateral movement using Graylog and Sysmon logs
– Detecting DNS Exfiltration using PCAPs, Zeeklogs and Rita
– Basic of Volatility memory analysis
– Producing a timeline of events from physical memory to trace actions to left of boom
– Using PCAPs, Zeeklogs and Rita to detect HTTP C2 Beacon
– Developing high fidelity YARA rules to help faster detect the behavioral characteristics observed in the precious exercises
– Exploiting Log4J exercise to get experience with popping a remote shell.
Students can do the exercises in order or select the ones they are most interested in. In addition since there is active C2 on the lab network we can also demonstrate how to use Bishop Fox Sliver for control over the victim machines and some of its functionality if anyone in the class is interested.
FRI 11/18
9AM-1PM
FRI 11/18 1PM-4PM
Tracing Transactions: Threat Hunting for Financially Motivated APTs
There is a serious lack of understanding on how to secure API calls. As a result, many companies are suffering from API security incidents. The purpose of this 4-hour workshop is to provide students with the knowledge and techniques required to penetration test APIs as well as provide recommendations to developers for better API Security. Students are required to have a level of understanding of Web Apps and APIs. Together, we will learn to hack to uncover the more common API vulnerabilities found in penetration testing and bug bounties.
API Hacking Workshop – Sunny Wear
There is a serious lack of understanding on how to secure API calls. As a result, many companies are suffering from API security incidents. The purpose of this 4-hour workshop is to provide students with the knowledge and techniques required to penetration test APIs as well as provide recommendations to developers for better API Security. Students are required to have a level of understanding of Web Apps and APIs. Together, we will learn to hack to uncover the more common API vulnerabilities found in penetration testing and bug bounties.
FRI 11/18
1PM-4PM
Software Reversing Made Easy Using Ghidra – Hahna Kane
This course introduces students to software reverse engineering using Ghidra. Students will walk away from this class knowing how to methodically
reverse x86 and x64 Linux binaries. It’s best to learn by doing so the concepts covered in this class will be taught primarily through hands-on
exercises. We kick the training off by getting everyone up to speed on x64 assembly so that you can immediately start analyzing any x64 or x86
binary without the need for source code. Using key features of Ghidra, we’ll reverse engineer binaries to identify data types and operators. We’ll recognize control flow patterns and understand arithmetic sequences. We’ll dissect function calls, calling conventions, and program structures. Using the disassembler, we’ll cover memory layout and addressing, including registers, the stack, heap, and memory segments. Each step of the way, students will solve binary puzzles that are reflective of real-world applications to learn the concept at hand. By the end of this class, students will have the necessary skills to reverse engineer binaries for offensive and defensive applications as well as for fun in CTF competitions.
WHO SHOULD TAKE THIS COURSE
Whether you’re a security professional, security enthusiast, or hobbyist, this course is for anyone who wants to figure out how to analyze, understand, and modify software without source code.
STUDENT REQUIREMENTS
Some knowledge of x86 assembly is required. Students should be comfortable with the basics of the C programming language. Familiarity with C++ or Python is a plus. If none of the above apply, then enough patience to go through the pre-class tutorials.
PRE-CLASS TUTORIALS
x86 Refresher: http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
C Programming: https://www.learn-c.org
WHAT STUDENTS SHOULD BRING
Students should bring a laptop with at least 20 GB of free disk space. The following software needs to be installed on each student laptop prior to the workshop:
– Ghidra. It is free to download here: https://ghidra-sre.org/
– We will be working in a Linux 64-bit environment. If the student’s laptop does not use a Linux 64-bit operating system,
the following software is also recommended for installation prior to the workshop:
VMware Workstation or Fusion. The free 30-day trial is sufficient and can be
downloaded here: https://www.vmware.com/try-vmware.html
Linux 64-bit virtual machine, specifically Ubuntu 20.04+ LTS. This can be downloaded here: https://ubuntu.com/download/desktop
Workshop Instructors
Philip Wylie
Phillip is a cybersecurity professional and offensive security SME with over 18 years of experience, over half of his career in offensive security. During his offensive security career, he has worked in consulting and as an internal pentesting resource for companies in the financial and consumer product industries. Phillip’s offensive security includes penetration testing, application pentesting, and red teaming. He enjoys mentoring and educating others about pentesting during workshops at conferences and other events. His offensive security educator roles include community college adjunct instructor and curriculum and content creation. Phillip co-authored the book, “The Pentester Blueprint: Starting a Career as an Ethical Hacker” based on his conference talk on starting a career as a pentester and was featured in the “Tribe of Hackers: Red Team.” He is also a podcaster and the host of “The Hacker Factory Podcast.”
Evan Wagner
Over 20 years of IT experience working for a variety of industries including Education, Healthcare, Telecom, Casinos, CDN/DDoS Protection services and more. The last decade being full time in cyber security. I have given many conference talks domestically to name a few locations from Silicon Valley to Miami, to Atlanta, New Orleans, Austin, Kansas City and international talks in Montreal and Haiti. Written multiple trainings in cyber forensics that have been provided to Federal, State and Public sector over the years. Participated in a lot of CTFs, winning many and losing many which is an exercise that got me interested in attending security conferences. Always excited to learn and to help people learn and improve their skills. Master League Starcraft 2 player.
Brandon DeVault
Brandon DeVault is a Security Author and Researcher focused on creating hands-on blue-team content at Pluralsight. He is also a member of the Florida Air National Guard with a variety of offensive and defensive experience. Prior to joining Pluralsight, Brandon worked with Elastic as an Education Architect creating and delivering security content. He also previously worked with Special Operations Command where he had two deployments on deployable communications teams. His experience spans incident response, threat hunting, penetration testing, satellite communications, system and network administration. Brandon is also passionate about hardware hacking, soldering, hiking, and currently holds the Security+, GCIA, GCED, and Elastic Engineer certifications.
Sunny Wear
Dr. Sunny Wear is a Web Security Architect and Penetration Tester. She provides secure coding classes, creates software, and performs penetration testing against web/API and mobile applications. Sunny has more than 25 years of hands-on software programming, architecture and security experience and holds a Doctor of Science in Cybersecurity. She is a published author, “Burp Suite Cookbook”, a developer of mobile apps such as the “Burp Tool Buddy”, and is a Pluralsight content creator with courses related to Burp Suite. She regularly speaks and holds classes at security conferences such as Defcon, Hackfest, and BSides.
Hahna Kane
For the past 16 years of her engineering career, Hahna Kane Latonick has worked throughout the defense industry specializing in cybersecurity as a computer security researcher for the Department of Defense and other defense contracting companies. She has been featured as a cybersecurity subject matter expert on Fox Business News, ABC, U.S. News and World Report, and other national media outlets. She currently serves as the VP of R&D for a cybersecurity firm and has led three tech startups teaching computer security, serving as CTO of two of them and Director of R&D. She has trained and developed security researchers at one of the top five aerospace and defense industry companies. She has also taught at CanSecWest, Ringzer0, and the Security BSides Orlando conferences. In 2014, she became a DEFCON CTF finalist, placing in 6th and ranking in the top 1.5% of ethical hackers worldwide. She also holds a CISSP and CEH certification. Latonick attended Swarthmore College and Drexel University where she earned her B.S. and M.S. in Computer Engineering along with a Mathematics minor.
Qasim Ijaz
Qasim Ijaz is a Director of Offensive Security at Blue Bastion Security and specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with a focus on networks and web applications testing. His areas of interest include healthcare security, Active Directory, cybersecurity policy, and the “dry” business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after-hours. Qasim has presented and taught at cybersecurity conferences including BSides and Blackhat on offensive security topics. He currently teaches a bootcamp on Offensive Security Certified Professional (OSCP) certification.