The June HackFormers meeting will be a full day training held on June 7, 2013. The training is free and open to all those who can register.
Please note: Although we were able to bring a top notch speaker/instructor and make it possible for to have high quality training at no cost to the attendees, we are unable to provide food and beverages to the attendees, for this event, due to lack of ‘food’ sponsors. This is a bring your own food and snacks event. Breakfast and lunch are *not* provided
Topic: Secrets to Penetrating Security Defenses; All things are possible through Christ.
Instructor: Dave ‘ReL1K’ Kennedy, Founder, TrustedSec, LLC; Author: Metasploit: The Penetration Tester’s Guide and Creator of Social Engineering Toolkit (SET) and DerbyCon Founder.
Date: June 7, 2013
Time: 9:00 a.m. – 5:00 p.m.
Venue: Microsoft Technology Center at Quarry Oaks 2.
Address: 10900 Stonelake Blvd. Suite 225. Austin, TX 78759
HackFormers’ mission is to “Teach Security; Teach Christ. Teach Security in Christ” and in this training, Dave and the HackFormers team will cover the mission objectives.
Training/Meeting details are given below.
Teach Security – what you can expect to learn
It is continuously becoming harder to circumvent the security controls on externally facing systems and gain full access to the internal network. With the different types of technologies, hardening techniques, and detection; the job of a penetration tester continues to get more advanced. This course is designed to teach advanced techniques in order to bypass security defenses, gain access to an organization, and further penetrate into the network. Learn the techniques, tricks, and secrets from the author of the Social-Engineer Toolkit (SET) and one of the top penetration testers. What you’ll learn in this course:
- Fundamental penetration testing concepts and an overview on methodologies and techniques.
- Basics of open-source tools and technologies and understanding attack avenues.
- Understanding of the Social-Engineer Toolkit (SET) and advanced features.
- Bypassing security technologies such as whitelisting/blacklisting, anti-virus, and other preventative measures.
- Develop a solid understanding of penetration testing techniques and tricks of the trade.
- High-level development concepts of Python and basics to programming.
- Creating your own exploits and tools in Python and utilizing them in attack vectors.
- An understanding of post exploitation and utilizing different tools and technologies in order to further penetrate a network.
- Hands on demonstrations, real world examples, and complete hands on with each of the phases of the course.
I am always reminded of Matthew 6:33 “But seek ye first the kingdom of God, and his righteousness; and all these things shall be added unto you.” Through Christ and God our Father, anything is possible and with enough hard work and dedication, new ideas and abilities for those that seek to learn. Our gift through God is our ability to learn from one another and continue to better ourselves through Christ. This class will build on what you know or want to know and help you on your journey to the next level in understanding penetration testing.
Course Requirements – WHAT STUDENTS NEED TO BRING
The student must have a working machine with Kali Linux as well as a Windows machine with Java loaded. These can be virtualized and one can be the primary. No anti-virus on the Windows machine (we will need to write bypass payloads first to evade). Ensure connectivity between the two virtual machines and that networking is working properly.