theDocumentId => 1319707 Black Hat USA 2015: Barkeep, Another Round of Pentests

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
11:00 AM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat USA 2015: Barkeep, Another Round of Pentests

Three weeks ago, we inaugurated a series of intel updates with a glimpse at the beginner-level pentest trainings you'll find at Black Hat USA 2015. Now that everyone's well rested, let's take a look at the show's more intermediate-level trainings.

There's no substitute for practice and real-world application, and that's what you'll find in Adaptive Penetration Testing. The majority of the course will focus on lab exercises, where you'll learn to overcome real-world obstacles and provide comprehensive and efficient security assessments. The training session will cover both network- and web-testing tools and frameworks such as Cobalt Strike, Metasploit, Nessus, Nmap, OWASP-ZAP, and SQLMap, as well as many others.

Next, how do you catch a ghost who's exfiltrating piles of data? By learning their tricks, of course. Adaptive Red Team Tactics will help take your adversarial tradecraft to a new level via controlled red-team operations. Learn to compromise a high-security network from start to finish, evading live network defenders, all without throwing a single exploit. Building on Veris Group's Adaptive Penetration Testing class, this immersive course teaches real-world adversarial tactics, techniques, and procedures (TTPs) refined through operational experience. Maybe you'll end up haunting some networks yourself.

As time goes on and new hardening techniques and detection technologies emerge, it grows increasingly more difficult to circumvent security controls on externally facing systems and gain full access to internal networks. Put another way, pentesting ain't getting any easier. Bypassing Security Defenses - Secret Penetration Testing Techniques will deliver exactly what's its title promises, thanks to the combined insights of David "ReL1K" Kennedy and Adrian "Irongeek" Crenshaw. By the end you'll have the foundation, methodologies and knowledge to understand how attackers can penetrate and compromise an organization through the entire lifecycle.

Last but not least -- it's already sold out, actually -- is offensive security's clearly popular Penetration Testing with Kali Linux. Starting with the basics of standard security tasks automation and going all the way to discovering, fuzzing, and writing buffer overflows, this course provides more than just "tool usage" instruction; it details the concepts that underlie all pentesting.

Black Hat USA 2015 will occur at the Mandalay Bay resort in Las Vegas. It goes down August 1-6, so there's plenty of time to lock in early-bird discounts.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-27
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
PUBLISHED: 2021-07-27
IBM Qradar SIEM 7.3.0 to 7.3.3 Patch 8 and 7.4.0 to 7.4.3 GA is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 196073.
PUBLISHED: 2021-07-27
IBM Sterling B2B Integrator Standard Edition through and through vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclos...
PUBLISHED: 2021-07-26
tinyexr commit 0.9.5 was discovered to contain an array index error in the tinyexr::SaveEXR component, which can lead to a denial of service (DOS).
PUBLISHED: 2021-07-26
tinyexr 0.9.5 was discovered to contain an array index error in the tinyexr::DecodeEXRImage component, which can lead to a denial of service (DOS).