From BruCON 2015
Jump to: navigation, search
m (Protected "Training Offensive" (‎[edit=sysop] (indefinite) ‎[move=sysop] (indefinite)))
(Offensive Techniques by Russ Gideon)
Line 1: Line 1:
 
=Offensive Techniques by Russ Gideon=
 
=Offensive Techniques by Russ Gideon=
In the professional information security world, there has yet to be a course which provides the
+
<!--In the professional information security world, there has yet to be a course which provides the
 
students the knowledge and skills to carry out a real world attack. Traditional penetration
 
students the knowledge and skills to carry out a real world attack. Traditional penetration
 
testing courses impart only a limited view of the exposure and vulnerabilities companies suffer
 
testing courses impart only a limited view of the exposure and vulnerabilities companies suffer
Line 101: Line 101:
 
** Token Hijacking
 
** Token Hijacking
 
* Domain Enumeration
 
* Domain Enumeration
 +
 +
=Trainer Biography=
 +
[[File:Attack-Research-Logo.jpg|190px|thumb|left]] '''Russ Gideon''' has many years of experience in information security fulfilling many diverse roles from
 +
being a core component of an Incident Response operation to managing an effective Red Team.
 +
Russ excels both at malware reverse engineering, which enables him to deeply understand how
 +
the attackers do what they do, as well as at high end Red Teaming where he has to penetrate
 +
sophisticated and well protected high value systems. Russ currently serves as the Director of
 +
Malware Research at Attack Research, LLC.
 +
 +
More information is available on [http://carnal0wnage.attackresearch.com carnal0wnage]
 +
 +
[[Image:300px-twitter-icon.jpg|17px]] [https://twitter.com/#!/attackresearch @attackresearch]
 +
 +
[http://www.attackresearch.com http://www.attackresearch.com]
 +
 +
[[File:Attack-Research-Logo.jpg|190px|thumb|left]] '''Dave Sayre''' has worked in the computer security area for the past ten years. He has specialized in reverse engineering, malware research, and penetration testing. He is currently a researcher at Attack Research.  Dave specializes on *nix systems and enjoys figuring out how to abuse various trust relations between *nix systems.-->
 +
 +
<br><br><br><br><br><br><br><br><br><br><br>
 +
''23 - 25 April (09:00 - 17:00)''
 +
 +
[[File:Register.jpg||link=https://registration.brucon.org/training-registration/]]
 +
 +
[[Training|Back to Training Overview]]
  
 
=Trainer Biography=
 
=Trainer Biography=

Revision as of 17:30, 9 December 2013

Offensive Techniques by Russ Gideon












23 - 25 April (09:00 - 17:00)

Register.jpg

Back to Training Overview

Trainer Biography

Attack-Research-Logo.jpg
Russ Gideon has many years of experience in information security fulfilling many diverse roles from

being a core component of an Incident Response operation to managing an effective Red Team. Russ excels both at malware reverse engineering, which enables him to deeply understand how the attackers do what they do, as well as at high end Red Teaming where he has to penetrate sophisticated and well protected high value systems. Russ currently serves as the Director of Malware Research at Attack Research, LLC.

More information is available on carnal0wnage

300px-twitter-icon.jpg @attackresearch

http://www.attackresearch.com

Attack-Research-Logo.jpg
Dave Sayre has worked in the computer security area for the past ten years. He has specialized in reverse engineering, malware research, and penetration testing. He is currently a researcher at Attack Research. Dave specializes on *nix systems and enjoys figuring out how to abuse various trust relations between *nix systems.












23 - 25 September (09:00 - 17:00)

Register.jpg

Back to Training Overview