HABEMUS CURSO.. A Practical Security For Fun, Profit and QoS


INTRODUCTION


NUEVA TEMPORADA, NUEVAS MOTIVACIONES..NUEVOS HACKERS


-The Real Spanish Hackers History X

-Kali Linux Quick Introduction

-Penetration Testing: White, Black, Grey and Double Grey Box

-Sec List, Standards, ISO/IEC 27000

-The CIA Triad  (Confidenciality, Integrity and Aviability)

-Minimun Privilege Principle

-Microsoft Threat Modeling, Stride, Dread, OSTMM Model, OWASP



WEB APPLICATION PENETRATION TESTING


-Agressive FingerPrinting

-Tactical FootPrinting

-Google Hacking: Building Your Own Dorks

-Shodan and Bing

-Stealing Cookies and Credentials using Cross Site Scripting

-From SQL Injection to Shell

-Cross Site Request Forgery

-Xpath INjection

-LDAP Injection

-ClickJacking

-Remote File Inclusion / Local File Inclusion

-OSINT

-Mitigation




ADAPTIVE PENETRATION TESTING: RED TEAM TACTICS (& DIRTY TRICKS :-) )


DAY 1


-Red Teaming Fundamentals

-Knowing the enemy

-Adversarial Mindset

-The Three Aspects of Red Teaming : Digital, Physical, Social

-Physical, mental and technical adaptation

-Enemies and friends.Who are they?



DAY 2

-Motivation: The key to the elite hacker, the key of the world

-IDART Metodhology Fundamentals

-OSINT Fundamentals

-Use and abuse of the human factor.

-Physical & Social Red Teaming

-We sent. Your obey. The Brain Power



DAY 3

-Red Team Tactics

-Dirty Tricks :-)

-Deepening OSINT

-Observe and Learn :REd Team Laws

-Tree Analisys Tools.

-Real Time Monitoring

-The Players

-Cobal Strike and Metasploit

-Advanced Social Engineering

-Using and abusing the human factor to extreme

-Tactical Stress Testing

-Knowing when you are attacking. Your defenses in the game, your defenses in real life

-Winning the game. Winner Never Quit, Quitters Never Win

-War Games: Doctor Falken,
shall we play a game?




WINDOWS HACKING


-From Desktop Hacking to SAM Cracking

-Tools

-Evil Power Shell

-DEP,ASLR,UAC,BitLocker


LINUX HACKING


-LOcal and Remote Hacking

-From Elevation Of Privilege to Upload WebShell

-Booting Linux

-Tools



REVERSE ENGINNERING

-Crack.Me and Tools Step By Step



MALWARE


-Trojans

-Worm

-Reverse Polimorfic Malware ( Flu, Poisong Ivi and More..)

-Building "a Little" Undetectable Trojan

-KeyLoggers

-RootKits



WIRELESS

-Standards

-Ad Hoc

-WarDriving

-WEP Attacks

-WPA-WPA2-PSK

-Chop-Chop Attack



ATTACKING NETWORK DEVICES

*With the introduction of dynamips as a Cisco IOS emulation tool, it is now possible to emulate almost any Cisco IOS image in a simulated hardware environment. 

**Of course the main problem with dynamips was that it was a CLI tool that required a lot of parameter knowledge. 

***To make the configuration easier, the dynagen tool was developed to provide an INI file-like configuration interface. 

For most of the old school engineers out there this was familiar, and easy to figure out and configure. 

****GNS3 was developed to take the ease of the configuration to a whole new level; this included a GUI-style interface that most people familiar with Windows based systems understood (almost anyone with a computer). 

GNS3 added additional abilities to the dynamips platform including support for Cisco PIX and ASA as well as Junipers – JunOS.

 – Well Known Vendors in Networking

 – Top Players in Internetworking

 – Core Internetworking Devices

 – Vulnerabilities Lookup from Famous Exploit – DB.com

 – Cisco Security Advisories

 – Security Testing of Internetworking Operating System

 – Recommended Lab Setup

– GNS3 Configuration

 – Walkthroughs on Hacking Network Devices

 – Attack Methodology

 – Understanding Firewalls and IDS

 – Fire-walking

 – Methods of Detection intrusion


                    -GNS3 Initial Configuration

                                                         

                                                                           Figure 1 shows the main GNS3 screen.

                          
                          -Dynamips/GNS3 Issues


     
                                                     Figure 2 shows the menu item to be selected to configure the Cisco IOS images.




VOIP

-Introduction

-SIP

-RTP

-Asterisk, OpenSer, HearBeat

-Attacking From The Virtual Ip




HOW TO BECOME A PCI/DSS AUDITOR


-QSA

-PCI Security Standard Council

-Tools

-PCI/DSS Reality




LOOKPICKING FUNDAMENTALS


-Opening Padlocks ( and some strong boxes)



INTEL SERIES

-Spionage



ANTI-FORENSIC

-OverWriting Data and Metadata

-Program Packers

-Generic Data Hiding

-Data Encription

-Targeting Forensic Tools (& Vulnerabilities)




YOU SHOULD KNOW

 -You should have prior knowledge of the following technologies to get the most out of this workshop, 

 -However, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily:


-Understanding of TCP/IP

-Knowledge of OSI Model

-Minimum Beginner Level Knowledge of Cisco( OR/AND Others)  Devices

-Minimum Knowledge of Operating Systems (Windows, Linux)

-HTML, JavaScript Fundamentals , SQL ++ for MySQL and One Server Language

-Basic Subnetting IPV4 Concepts 



KEY AUDIENCE


-Network Administrators

-Information Security Officers

-New Graduates in IT and Newbies, who want to learn hacking



Course Fee :1800 Euros 

Modules Fee: Between 100 Euros - 300 Euros

Reservation: 200 Euros

Limited Place

First Day : When you Want

Important: The money is not returned. Obviously if you're going to test whether auditor or vouchers for hacker and then you see that  not that , you'll wanr your money, but the money is not returned, as in all security training centers... in all training center

On-Line Modules Too. For More Information : via Contact Formulary

All The Sec Trainner are Working Actually and They are Recognized Professionals In The World of Computer Security


Thans You Very Much.

Disociacion de Claves Parte II

Another article about PowerShell

if something I have made clear working with Powershell for so long is that it is not as simple as many want it to appear and the second...

Aplicando Gauss...y su campana