A practical security for fun and work



INTRODUCTION



NUEVA TEMPORADA, NUEVAS MOTIVACIONES..NUEVOS HACKERS



                                             Resultado de imagen de kali linux




-The Real Spanish Hackers History X


-Kali Linux Quick Introduction


-Penetration Testing: White, Black, Grey and Double Grey Box


-Sec List, Standards, ISO/IEC 27000


-The CIA Triad  (Confidenciality, Integrity and Aviability)


-Minimun Privilege Principle


-Microsoft Threat Modeling, Stride, Dread, OSTMM Model, OWASP




WEB APPLICATION PENETRATION TESTING



                               



-Agressive FingerPrinting


-Tactical FootPrinting


-Google Hacking: Building Your Own Dorks


-Shodan and Bing


-Stealing Cookies and Credentials using Cross Site Scripting


-From SQL Injection to Shell


-Cross Site Request Forgery


-Xpath INjection


-LDAP Injection


-ClickJacking


-Remote File Inclusion / Local File Inclusion


-OSINT


-Mitigation





ADAPTIVE PENETRATION TESTING: RED TEAM TACTICS (& DIRTY TRICKS :-) )


                                 

DAY 1


               


KEVIN MITNICK Y DAVE rE1LIK CREADOR DE aRMITAGE



-Red Teaming Fundamentals



-Knowing the enemy



-Adversarial Mindset



-The Three Aspects of Red Teaming : Digital, Physical, Social



-Physical, mental and technical adaptation



-Enemies and friends.Who are they?





DAY 2




                                                 


-Motivation: The key to the elite hacker, the key of the world


-IDART Metodhology Fundamentals


-OSINT Fundamentals


-Use and abuse of the human factor.


-Physical & Social Red Teaming


-We sent. Your obey. The Brain Power




DAY 3





                            


-Red Team Tactics


-Dirty Tricks :-)


-Deepening OSINT


-Observe and Learn :REd Team Laws


-Tree Analisys Tools.


-Real Time Monitoring


-The Players


-Cobal Strike and Metasploit


-Advanced Social Engineering


-Using and abusing the human factor to extreme


-Tactical Stress Testing


-Knowing when you are attacking. Your defenses in the game, your defenses in real life


-Winning the game. Winner Never Quit, Quitters Never Win


-War Games: Doctor Falken,


shall we play a game?



                                                     





WINDOWS HACKING



-From Desktop Hacking to SAM Cracking


-Tools


-Evil Power Shell


-DEP,ASLR,UAC,BitLocker




LINUX HACKING



-LOcal and Remote Hacking


-From Elevation Of Privilege to Upload WebShell


-Booting Linux


-Tools




REVERSE ENGINNERING


-Crack.Me and Tools Step By Step




MALWARE



-Trojans


-Worm


-Reverse Polimorfic Malware ( Flu, Poisong Ivi and More..)


-Building "a Little" Undetectable Trojan


-KeyLoggers


-RootKits




WIRELESS



-Standards


-Ad Hoc


-WarDriving


-WEP Attacks


-WPA-WPA2-PSK


-Chop-Chop Attack




ATTACKING NETWORK DEVICES



*With the introduction of dynamips as a Cisco IOS emulation tool, it is now possible to emulate almost any Cisco IOS image in a simulated hardware environment. 




**Of course the main problem with dynamips was that it was a CLI tool that required a lot of parameter knowledge. 




***To make the configuration easier, the dynagen tool was developed to provide an INI file-like configuration interface. 




For most of the old school engineers out there this was familiar, and easy to figure out and configure. 




****GNS3 was developed to take the ease of the configuration to a whole new level; this included a GUI-style interface that most people familiar with Windows based systems understood (almost anyone with a computer). 




GNS3 added additional abilities to the dynamips platform including support for Cisco PIX and ASA as well as Junipers – JunOS.




 – Well Known Vendors in Networking


 – Top Players in Internetworking


 – Core Internetworking Devices


 – Vulnerabilities Lookup from Famous Exploit – DB.com


 – Cisco Security Advisories


 – Security Testing of Internetworking Operating System


 – Recommended Lab Setup


– GNS3 Configuration


 – Walkthroughs on Hacking Network Devices


 – Attack Methodology


 – Understanding Firewalls and IDS


 – Fire-walking


 – Methods of Detection intrusion



   -GNS3 Initial Configuration




                                       Figure 1 shows the main GNS3 screen.

                                        



                                                          


                                                                           


                           

                         


Figure 2 shows the menu item to be selected to configure the Cisco IOS images.

     





VOIP



-Introduction


-SIP


-RTP


-Asterisk, OpenSer, HearBeat


-Attacking From The Virtual Ip





HOW TO BECOME A PCI/DSS AUDITOR



-QSA


-PCI Security Standard Council


-Tools


-PCI/DSS Reality





LOOKPICKING FUNDAMENTALS



-Opening Padlocks ( and some strong boxes)




INTEL SERIES



                                       


    




   -Spionage




ANTI-FORENSIC




                                            




-OverWriting Data and Metadata


-Program Packers


-Generic Data Hiding


-Data Encription


-Targeting Forensic Tools (& Vulnerabilities)





YOU SHOULD KNOW



 -You should have prior knowledge of the following technologies to get the most out of this workshop, 


 -However, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily:



-Understanding of TCP/IP


-Knowledge of OSI Model


-Minimum Beginner Level Knowledge of Cisco( OR/AND Others)  Devices


-Minimum Knowledge of Operating Systems (Windows, Linux)


-HTML, JavaScript Fundamentals




KEY AUDIENCE



-Network Administrators


-Information Security Officers


-New Graduates in IT and Newbies, who want to learn hacking




Course Fee :650 Euros


Modules Fee: Between 100 Euros - 300 Euros


Reservation: 100


Limited Place


First Day : 15 Marzo 2016




Important: The money is not returned. Obviously if you're going to test whether auditor or vouchers for hacker and then you see that  not that , you'll wanr your money, but the money is not returned, as in all security training centers... in all training center


On-Line Modules Too. For More Information : via Contact Formulary


All The Sec Trainner are Working Actually and They are Recognized Professionals In The World of Computer Security



Thans You Very Much.


@HabemusCurso

Best Wishes

HabemusCurso Penetration Testers Team

Disociacion de Claves Parte II

Another article about PowerShell

if something I have made clear working with Powershell for so long is that it is not as simple as many want it to appear and the second...

Aplicando Gauss...y su campana