(→Dissecting Wireless Network Security by Vivek Ramachandran) |
|||
Line 58: | Line 58: | ||
We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the- | We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the- | ||
Middle attacks and taking on the live Wi-Fi CTF! | Middle attacks and taking on the live Wi-Fi CTF! | ||
+ | |||
+ | Topics that will be addressed in the training : | ||
+ | * Understanding WLAN protocol basics using Wireshark | ||
+ | * Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs | ||
+ | * Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise | ||
+ | * Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM attacks | ||
+ | * Advanced Enterprise Attacks – attacking 802.1x, Radius server, Cisco LEAP, SSL MITM over Wireless, IPSec over WLAN attacks | ||
+ | * Attacking Wireless Intrusion Detection and Prevention Systems | ||
+ | * Attacking the Wireless Client – Honeypots, Hotspot attacks, Caffe-Latte, Hirte Attack, Ad-Hoc networks and Viral SSIDs, WiFishing | ||
+ | * Compromising the Client using Metasploit and SET post wireless network hijacking | ||
+ | * Wireshark as a wireless forensics tool | ||
+ | * Extending Aircrack-NG for fun and profit | ||
+ | * Programming Wireless Sniffers and Packet Injectors using raw sockets and 3rd party libraries | ||
+ | * Over 25 hands-on lab sessions on different attacks | ||
+ | * 5 pure Wi-Fi CTF challenges of varying difficulty played at various stages in the training |
Revision as of 21:24, 24 May 2011
These are the confirmed trainings for Brucon 2011
Contents
- 1 FAIR - Factor Analysis of Information Risk by Jack Jones
- 2 Corelan Live – Win32 Exploit Development Bootcamp by Peter Van Eeckhoutte
- 3 There’s An App For That (Pentesting Mobile Apps) by Joe McCray
- 4 Threat Modeling and Architecture review by Pravir Chandra
- 5 Dissecting Wireless Network Security by Vivek Ramachandran
FAIR - Factor Analysis of Information Risk by Jack Jones
Factor Analysis of Information Risk (FAIR) provides a framework for understanding, analyzing, and measuring information risk. The outcomes are more cost-effective information risk management, greater credibility for the information security profession, and a foundation from which to develop a scientific approach to information risk management.
This training will introduce the students to FAIR and teach them how to apply it to real-life scenarios.
At the end of training, students are eligible to take a certification exam at no additional cost.
Everyone who attends training receives a free copy of the FAIRLite Excel-based application. FAIRLite is an Excel application designed to enable simple and effective quantitative analysis of risk scenarios using the FAIR framework. Developed by a former CISO who understands the need for efficient and practical tools, FAIRLite is simple to use and yet flexible enough to per- form powerful analyses on complex scenarios.
Note that FAIRLite requires an Excel plugin from RiskAMP.com. A fully functional 30-day demo version of the RiskAMP plugin is provided to students. Students may purchase the plugin (Professional Edition required) directly from RiskAMP for $249.95.
Students are considered to have a basic understanding of risk and some experience in one or more disciplines related to risk (e.g., information security, disaster recovery, continuity management, operational risk, etc.).
Corelan Live – Win32 Exploit Development Bootcamp by Peter Van Eeckhoutte
Based on the Corelan tutorials, this hands-on course will provide students with solid understanding of current Win32 stack based exploitation techniques :
- Win32 memory management
- Using debuggers and debugger plugins such as pvefindaddr
- Exploiting stack buffer overflows
- Bypassing memory protections (Safeseh, sehop, stack cookies, aslr, dep)
- Dealing with character set conversions and transformations (Unicode, etc)
- Using egghunters, omelet egg hunters
- Writing and integrating modules for Metasploit
- Writing shellcode
There’s An App For That (Pentesting Mobile Apps) by Joe McCray
This is a 2-day workshop focused on hands-on mobile application security testing. Each day this course starts you off with setting up your environment (emulator/sdk/hardware/etc), then quickly moves into using your device as an attack platform. From there the course goes into the basics of reverse engineering mobile applications, exploiting mobile applications on each respective platform, and finally on to attacking web services from each platform.
Threat Modeling and Architecture review by Pravir Chandra
Threat Modeling & Architecture Review are cornerstones of a preventative approach to Software Security Assurance. By combining these topics into single comprehensive course attendees can get a complete understanding of how to understand the risks an application faces and how the application will handle those potential problems. This enables consistently accurate assessment of an application’s security posture and recommendation of appropriate improvements or mitigating controls.
Dissecting Wireless Network Security by Vivek Ramachandran
This workshop will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the participants with a deep understanding of the principles behind various attacks and not just a quick how- to guide on publicly available tools.
We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the- Middle attacks and taking on the live Wi-Fi CTF!
Topics that will be addressed in the training :
- Understanding WLAN protocol basics using Wireshark
- Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs
- Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise
- Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM attacks
- Advanced Enterprise Attacks – attacking 802.1x, Radius server, Cisco LEAP, SSL MITM over Wireless, IPSec over WLAN attacks
- Attacking Wireless Intrusion Detection and Prevention Systems
- Attacking the Wireless Client – Honeypots, Hotspot attacks, Caffe-Latte, Hirte Attack, Ad-Hoc networks and Viral SSIDs, WiFishing
- Compromising the Client using Metasploit and SET post wireless network hijacking
- Wireshark as a wireless forensics tool
- Extending Aircrack-NG for fun and profit
- Programming Wireless Sniffers and Packet Injectors using raw sockets and 3rd party libraries
- Over 25 hands-on lab sessions on different attacks
- 5 pure Wi-Fi CTF challenges of varying difficulty played at various stages in the training