Training at Hack Red Con 2022

Training Track 1: Practical Burp Suite Pro: Advanced Tactics

By: Tim Tomes, Founder PractiSec

Do you feel pretty good about your Web Application Security testing methodology, but think you might be able to get more out of your tools? Years of experience providing instruction on the process of conducting Web Application Security assessments has made it clear. Even the most experienced testers lack a complete understanding of everything that is available in the industry’s #1 Web Application Security testing tool: PortSwigger’s Burp Suite Pro. It’s time to fix that with PBAT.

PBAT provides comprehensive training on the capabilities of Burp Suite Pro and the practical application of these capabilities in real world web application penetration testing engagements. The instructor will introduce the various components of Burp Suite Pro, discussing their purpose, strengths, and limitations, and lead students in realistic scenario driven hands-on exercises leveraging the components against a modern web application. As the scenarios unfold, the instructor will share tips and tricks for using Burp Suite Pro gained from years of personal usage experience and extensive research into the tool's capabilities and ongoing expansion. These scenarios include the use of lesser-known features hidden within the Burp interface, and the modification and chaining of features to solve complex problems that make testing modern applications a challenge.

As a Portswigger Preferred Burp Suite Pro Trainer, Tim is a trusted source for comprehensive training on Burp Suite Pro v2.0. Since v2.0 was announced in August 2018, Tim has been the leader in researching and identifying the differences between the old and new versions of Burp Suite Pro, and assisting Web Application Security professionals in the transition.

Skill Requirements

PBAT is 100% focused on Burp Suite Pro v2.0 and does not address the methodology and process of web application penetration testing or specific vulnerabilities. However, the class is taught within the context of a web application penetration test in order to provide realistic scenarios for the tool’s usage. While not an official continuation of Practical Web Application Penetration Testing (PWAPT), PBAT is a great follow-up for students who have previously attended PWAPT.

Technical Requirements

  • Laptop with the latest VMware Player, VMware Workstation, or VWware Fusion installed. Other virtualization software such as Parallels or VirtualBox will probably work if the attendee is familiar with its functionality. However, VMware Player should be prepared as a backup.

  • Ability to disable all security software on their laptop such as Antivirus and/or firewalls (Administrator).

  • At least twenty (20) GB of hard drive space.

  • At least four (4) GB of RAM.

Training Track 2: Uncomplicated Social Engineering

By: Joshua Crumbaugh, Chief Hacker @ Phish Firewall

Easy to duplicate beginner to intermediate social engineering tactics to make you a social engineering superstar!
 

TOPIC SUMMARY:

 Have you ever fallen victim to a social engineering attack, and wondered how they did it?

Social engineering is the art of manipulating people, so they give up confidential information or gain access to facilities. Not all cyber security attacks rely on system weaknesses. Often, cyber criminals use human naivety to trick unsuspecting victims whether it by phone, text, social media, or in person.

 

TRAINING:

This training is designed to give attendees the tactics, confidence, and training necessary to become not only aware but beginners’ basics on social engineering. Attendees will learn basic social engineering tactics, such as chain attacks, increase the probability of success, plan for attacks and so much more.  Anyone who desires to be able to do things like talk their way into bank vaults, data centers, SCIFs or casino money cages needs to attend this training.  We will have a hands-on portion of the education where attendees will put their newfound knowledge to use in a fun phone-based exercise designed to exercise their skills.

    

MINIMUM COURSE REQUIREMENTS:
Bring a laptop with 4 GB of RAM at minimum and Quad-Core Processor at minimum ability to run Virtual Machines
Understanding of basic social engineering concepts (Desirable)
Understanding of basic network penetration testing concepts (Desirable)

TARGET AUDIENCE:
This course is targeted toward individuals looking to lean basic social engineering knowledge and tactics. This course will give them the skills necessary to excel in social engineering.  
 

TRAINING OUTLINE:

Day 1

9:00 – Introduction

9:30 – Lessons in Social Engineering w/ Real-World Examples/Stories

10:45 – Break 15 mins

11:00 – Tools & Setup

12:00 – Lunch

1:30 – Basic Tactics of Social Engineering 

2:30 – OSINT Tactics for Social Engineers

3:30 – Break for day

 

Day 2 Training:

9:00 – Begin Real World Exercises

9:30 – OSINT Hands On Exercise

10:30 – 15 min break

10:45 – Social Engineering Pretext Development - Vishing (Group A)

10:45 – Social Engineering Pretext Development - Phishing (Group B)

12:00 – Lunch

1:00 – Hands On Vishing

2:00 – Hands On Phishing

Training Track 3: Penetration Testing for Systems and Network Adm

By: Qasim "Q" Ijaz/ Jake Nelson Senior Security Consultant's at Blue Bastion Security/ 

The objective of this Capture-the-Flag style class is to take students with existing networks or systems administration experience and teach them how to:

 

  1. Perform a comprehensive penetration test against Active Directory environments.

  2. Spot a bad penetration test. 

 

We understand that not everyone taking a pen test class will want to be a penetration tester. Hence, we have organized this class to be a well-rounded experience, allowing both aspiring red teamers and blue teamers to get the most out of it. This class will provide students with hands-on experience with all phases of a penetration test, from information gathering to reporting. 

 

Class Schedule:

Day 1: 

  • What does a good pen test look like?

  • Pre-assessment activities

  • Passive and active information gathering

  • Vulnerability analysis in an Active Directory environment

  • Exploitation

Day 2

  • Post exploitation 

  • Lateral movement

  • Domain privilege escalation

  • Reporting

 

A Note to Prospective Students: 

An introductory penetration testing class like this will only be beneficial to students who intimately know computer networking and have Windows administration experience. Existing experience with Windows command line, Linux administration, and Active Directory is highly recommended. For example, students should know how a packet traverses from point A to point B on the OSI model, and what HTTP GET and POST requests look like. Students should be comfortable with the Linux command line as our primary attack host will be Linux-based. 

 

Students should bring a laptop capable of running a Kali Linux VM and connecting to a wireless network. A VirtualBox image of customized Kali Linux will be provided. Instructors will not provide support for VMWare, Parallels, Hyper-V, or other virtualization platforms. 

 

Lab connectivity guide and Kali Linux image will be provided to students a week before the class. 

 

Instructor Bios:

Qasim "Q" Ijaz is a Senior Security Consultant at Blue Bastion Security and specializes in healthcare security and penetration testing. He has conducted hundreds of penetration tests in small to large environments with a focus on networks and web applications testing. His areas of interest include healthcare security, Active Directory, cybersecurity policy, and the "dry" business side of hacking. Qasim is a penetration test lead during the day and a teacher in the after-hours. Qasim has presented and taught at cybersecurity conferences including BSides and Blackhat on offensive security topics. He currently teaches a bootcamp on Offensive Security Certified Professional (OSCP) certification.

 

Jake Nelson is a Security Consultant at Blue Bastion Security. He comes from Linux and Unix administration background. Jake has worked in a variety of industries and has been pentesting for the last 3 years. Teaching students has been a favorite part of his previous jobs and that has resulted in helping to teach clients how to better secure their networks.

Training Track 4

API Pentesting

Training Track 5

Manufacturing Penetration Testing

Training Track 6

Hardware Penetration Testing

Training Track 7

Human Intelligence

Training Track 8

Infrastructure Systems