Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat USA
July 31 - August 5, 2021
Las Vegas, NV, USA
November 4 - October 30, 2021
Toronto, ON, Canada
Black Hat Europe
November 8-11, 2021
Virtual Event
11:00 AM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat USA 2015: Barkeep, Another Round of Pentests

Three weeks ago, we inaugurated a series of intel updates with a glimpse at the beginner-level pentest trainings you'll find at Black Hat USA 2015. Now that everyone's well rested, let's take a look at the show's more intermediate-level trainings.

There's no substitute for practice and real-world application, and that's what you'll find in Adaptive Penetration Testing. The majority of the course will focus on lab exercises, where you'll learn to overcome real-world obstacles and provide comprehensive and efficient security assessments. The training session will cover both network- and web-testing tools and frameworks such as Cobalt Strike, Metasploit, Nessus, Nmap, OWASP-ZAP, and SQLMap, as well as many others.

Next, how do you catch a ghost who's exfiltrating piles of data? By learning their tricks, of course. Adaptive Red Team Tactics will help take your adversarial tradecraft to a new level via controlled red-team operations. Learn to compromise a high-security network from start to finish, evading live network defenders, all without throwing a single exploit. Building on Veris Group's Adaptive Penetration Testing class, this immersive course teaches real-world adversarial tactics, techniques, and procedures (TTPs) refined through operational experience. Maybe you'll end up haunting some networks yourself.

As time goes on and new hardening techniques and detection technologies emerge, it grows increasingly more difficult to circumvent security controls on externally facing systems and gain full access to internal networks. Put another way, pentesting ain't getting any easier. Bypassing Security Defenses - Secret Penetration Testing Techniques will deliver exactly what's its title promises, thanks to the combined insights of David "ReL1K" Kennedy and Adrian "Irongeek" Crenshaw. By the end you'll have the foundation, methodologies and knowledge to understand how attackers can penetrate and compromise an organization through the entire lifecycle.

Last but not least -- it's already sold out, actually -- is offensive security's clearly popular Penetration Testing with Kali Linux. Starting with the basics of standard security tasks automation and going all the way to discovering, fuzzing, and writing buffer overflows, this course provides more than just "tool usage" instruction; it details the concepts that underlie all pentesting.

Black Hat USA 2015 will occur at the Mandalay Bay resort in Las Vegas. It goes down August 1-6, so there's plenty of time to lock in early-bird discounts.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-08-04
A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending...
PUBLISHED: 2021-08-04
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization.
PUBLISHED: 2021-08-04
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
PUBLISHED: 2021-08-04
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
PUBLISHED: 2021-08-03
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however...