[ :: mainpage :: register :: conference :: training :: call for papers (CFP) :: the venue ]
[ :: capture the flag (CTF) :: press/media :: conference agenda :: contact us ]
[ :: forum :: sponsors :: past conferences :: conference kit (PDF) ]

TECH TRAINING 2 - Attacking & Defending Networks (Advanced Linux Edition)

Filed under: Main Page — Administrator @ 7:58 pm

April 13, 2006

Title: Attacking & Defending Networks (Advanced Linux Edition)
Trainer: Nish Bhalla, (VP Consulting Solutions, Security Compass)
Capacity: 24 pax
Seats left: CLASS IS CLOSED
Duration: 2 days
Cost: (per pax) RM2800 (early bird) / RM3200 (non early-bird)

Description of Class:

The purpose of this course is to provide advanced tech leads, testers, administrators, network administrators and all other participants detailed security techniques and knowledge as applied to Network security and Host Security.

It is focused towards helping users understand how to find and write basic stack based exploits. Participants will also learn how to take advantages of vulnerabilities that might exists in an environment and use backchannels to connect back into a network.

Hands-on lab exercises reinforce the course material in a real world environment.

Audience of the course:

The course will be beneficial to experienced security administrator, security auditor and/or security consultant. Knowledge of advanced UNIX and Windows would help make this course more beneficial to you.

Prerequisite:

Basic knowledge of programming on Windows or Linux is a pre-requisite. Having knowledge of using an editor like vi or Emacs and having the knowledge of compiled using Gcc / Visual Studio is a pre-requisite.

Laptops:

All students will be required to bring their own laptop; and must have administrative access on their laptops to install software. VM-Player (http://www.vmware.com/products/player/) will be installed. Windows/Linux images will be provided for use during the class. It is recommended that the laptops have 512 MB of RAM and 8GB of free disk space.

Recommended Reading:
This reading material is recommended reading and will help make the course more beneficial.

Smashing the stack for fun and profit : http://www.insecure.org/stf/smashstack.txt
Vi Reference: http://www.egr.up.edu/contrib/oster/vi-reference.pdf
Emacs Reference: http://www.cs.dal.ca/studentservices/refcards/emacs.pdf
The GCC / GDB / Quick Reference part: http://users.cs.dal.ca/~jost/4131/UnixProgrammingTools.pdf

Material:

All students will be provided printed material of the class slides and tools to download.

PART I – Introduction To Buffer Overflows [8 Hour]

Buffer Overflows [ Linux]
Basics of Stack
Assembly basics
Understand stack overflows
exploiting local stack overflows
writing a local stack overflow

PART II – Wireless [4 Hours ]

Basics of wireless hacking
How to Find Wireless Networks.
Breaking WEP/WPA/LEAP
Setting up a Fake AP (Either on Linux / Linksys WRT54GL)

PART III – Network Scanning & Back Channels [ 2 Hours ]

Network Scanning & Hacking
Advanced Port / Network Scanning techniques
MITM Attacks
SSL MITM Attacks
SSH MITM Attacks
DNS Spoofing Attacks
Ettercap to the Rescue
TCP Hijacking

Back Channels [Methods of hiding and bypassing firewalls] [ 2 Hours]

Bash Shell Based Back Channels
XML Based Back channels
HTTP Based Back channels
MSN Based Back Channels



About the trainer:

Nishchal Bhalla, the Founder of Security Compass, is a specialist in product, code, web application, host and network reviews.

Nish has coauthored “Buffer Overflow Attacks: Detect, Exploit & Prevent” and is a contributing author for “Windows XP Professional Security”, “HackNotes: Network Security”, “Writing Security Tools and Exploits” and “Hacking Exposed: Web Applications, 2nd Edition”. Nish has also been involved in the open source projects such as YASSP and OWASP, and is the chair of the Toronto Chapter. He has also written articles for securityfocus and also spoken at web seminars for Global Knowledge and University of Florida.

He is a frequent speaker on emerging security issues. He has spoke at reputed Security Conferences such as at “Reverse Engineering Conference 2005″ in Montreal, the “HackInTheBox 2005″ in Malaysia and “ISC2’s Infosec Conference” in Las Vegas and New York. He also has created and taught the Exploiting & Defending Classes for Security Compass. Some of the upcoming conferences he is going to be speaking at are “ISC2’s Infosec Conference” in DC/Toronto, CSI’s NetSec conference in Arizona and Dallascon.

Prior to joining Security Compass, Nish was a Principal Consultant at Foundstone, where he performed numerous security reviews (Web Application / Code ) for major software companies, online banking and trading & e-commerce sites. He also helped develop and teach the “Secure Coding” class, the Ultimate Hacking, Ultimate Web Hacking and Ultimate Hacking Expert classes. Prior to working at Foundstone, Nish provided engineering and security consulting services as an independent consultant to a variety of organizations including Sun Microsystems, Lucent Technologies, TD Waterhouse & The Axa Group.

Nish holds his Masters in Parallel Processing from Sheffield University, is a post graduate in Finance from Strathclyde University and a Bachelor in Commerce from Bangalore University.



Event Organizer


Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By


Malaysian Communications and Multimedia Commission (MCMC)


Malaysian Administrative Modernisation & Management Planning Unit

Platinum Sponsors


Foundstone - A division of McAfee Inc.

Microsoft Corporation

Main Sponsors

Cisco Systems

Lucent Technologies - Bell Labs Innovations

Official Airline Partner


Internet Bandwidth Sponsor


AIMS - Malaysia's Telecommunications Hub

Official Hotel


Westin Kuala Lumpur

CTF Sponsor


Ascendsys

CTF Prize Sponsor


Scan Associates Berhad.


Our Speakers Are Supported By:


Bellua Asia Pacific


Core Security Technologies

Media Partners:

InfoSec News

(ISN) InfoSec News

Virus Bulletin online magazine is dedicated exclusively to reporting and analysing malicious computer programs and spam. The annual Virus Bulletin conference is cited by many in the industry as the anti-malware event of the year.

Insecure Magazine

Phrack Magazine

Hakin9 Magazine

Supporting Organizations


HERT


ISECOM - Insititue for Security and Open Methodologies


IT Underground


Chaos Computer Club (Germany)


X-Focus China

Zone-H Defacement Mirror


Xatrix Security


SyScan


Special Interest Group in Security & Information InteGrity Singapore