Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
May 10-13, 2022
Hybrid/Marina Bay Sands, Singapore
Black Hat USA
August 6-11, 2022
Las Vegas, NV, USA
Black Hat Europe
December 5-8, 2022
London
1/6/2015
11:00 AM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat Asia 2015: Pentest Trainings

For the second year running -- it's almost a tradition! -- Black Hats returning to the Marina Bay Sands in Singapore to put on Black Hat Asia 2015, where the industry's brightest professionals and researchers will gather for four days.

Penetration testing shares one thing with many other pursuits: Practice and real-world application are critical to effectively learning its craft. That's where Adaptive Penetration Testing comes in. Or rather, you'll come into a fully functional lab environment, facing real-world obstacles from today's enterprises. Spanning both network and web testing, the course will give you hands-on practice with the most popular tools and frameworks, from Cobalt Strike to Veil Framework. Wanna learn to pentest? This is your training.

Embedded devices beware, because the minds behind Assessing and Exploiting Control Systems with SamuraiSTFU have your number. Billed as a non-traditional take on SCADA security, the course will teach you how to employ NESCOR's formal pentesting methodology using SamuraiSTFU (Security Testing Framework for Utilities) to perform hands-on pentesting against embedded electronic field devices, their RF communications, and the myriad of user interfaces used throughout smart grid systems.

Finally, if you want to break free of the limits of third-party pentest tools, you can learn how to roll up some custom exploits in Dark Side Ops: Custom Penetration Testing. By the Training's end you'll have learned to bypass network-based enterprise intrusion detection and prevention systems (IDS/IPS), layer 7 web proxies, and data loss prevention (DLP) solutions with nothing but your own backdoors, payloads, and persistence measures. Showoff.

If this all sounds fun -- and we think it does -- you can secure your Black Hat Asia 2015 attendance at early bird rates. It's like Christmas came early.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-5683
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.
CVE-2013-6390
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.
CVE-2013-6423
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.
CVE-2013-6464
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.
CVE-2013-6471
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2013. Notes: none.