{"id":13621,"date":"2024-02-07T02:34:08","date_gmt":"2024-02-07T02:34:08","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/"},"modified":"2024-07-29T04:17:42","modified_gmt":"2024-07-29T04:17:42","slug":"practical-linux-attack-paths-bkk2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/","title":{"rendered":"Practical Linux Attack Paths and Hunting for Red and Blue Team"},"content":{"rendered":"<h4><strong><span style=\"color: #993300;\">ATTEND IN-PERSON<\/span><\/strong><strong><span style=\"color: #993300;\">: <\/span><\/strong><strong>Onsite in Bangkok, Thailand<\/strong><\/h4>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"page\" title=\"Page 3\">\n<h4><strong>DATE: 26-28 August 2024<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px;\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>26 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>27 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>28 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<hr \/>\n<h5 style=\"text-align: center;\"><span style=\"color: #993300;\"><em>Full access to the PurpleLabs environment for 30 days post-training and lifetime material access (180+ labs) with updates included!<\/em><\/span><\/h5>\n<hr \/>\n<h5 dir=\"ltr\"><\/h5>\n<h5>Dive into the world of Linux attack paths, local and remote exploitation, process injection, process hiding, tunneling, network pivoting, and syscall hooking techniques. See hands-on how Linux malware, userspace, and kernel space rootkits work in well-prepared Detection PurpleLabs Cyber Range, analyze and modify the source codes, find interesting behavior patterns in binaries and logs, learn what telemetry is needed to catch modern Linux threat actors, and find how to proactively validate and improve detection coverage with step-by-step Linux adversary emulations. On top of that, run your VMs RAM acquisition \u2018on click\u2019 and analyze memory images with Volatility Framework 2\/3 at any stage of the course.<\/h5>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>This training is a walkthrough of the Open Source Linux offensive and defensive techniques and tooling in 2023\/2024 that allows for chaining these TTPs together and understanding better the threat ecosystems in Linux. I trust this training compilation and hands-on experience will change the way you look at hardening and low-level monitoring of your critical Linux-based ecosystems.<\/p>\n<p>This course takes on An \u201cAttack vs. Detection\u201d approach in a condensed format. This class is intended for students who have a basic understanding of Linux and have to deal with advanced threats. Furthermore, the course is also interesting for experienced DFIR\/SOC\/CERT Players who aim to dig deeper into understanding Linux internals and corresponding network attack analysis techniques, detection, and response.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><strong>Learn Linux Internals with PurpleLabs<\/strong><\/h5>\n<p>\u201cPractical Linux Attack Paths and Hunting for Red and Blue Team&#8221; training has been created with a focus on realistic hands-on experience in analyzing user space and kernel space Linux rootkits, including recent Linux APT campaigns, C2 frameworks for Linux with a focus on Sliver\/Metasploit overview\/behavior vs hunting\/DFIR tooling in Linux ecosystem. This training helps create and understand low-level Linux attack paths, improve your Linux detection coverage, see in action many Open Source DFIR\/defensive projects, and understand the need for Linux telemetry, especially including Docker\/Kubernetes clusters where Runtime Security solutions are a must these days. The techniques and attack paths covered in this training include many different implementations of loading LKM remotely, eBPF, XDP, FTRACE, KPROBE, UPROBE, NETFILTER, SYSTEMTAP, PAM, SSHD, HTTPD\/NGINX, LD_PRELOAD-based code samples and PoCs. Detection and forensics layers include LKRG, BPFTOOL, VELOCIRAPTOR IR, OSQUERY, Elastic Security, cli-based \/proc\/ and \/sys\/ analysis, memory forensics with VOLATILITY FRAMEWORK with the semi-automated RAM acquisition, SYSMON4Linux, FALCO, TRACEE, SYSDIG, TETRAGON, SANDFLY SECURITY, ZEEK, SURICATA, MOLOCH\/ARKIME, YARA and more.<\/p>\n<p>During the training, we are going to make a custom combo of both red and blue parts and we will achieve that by utilizing an Attack Flow Builder, Defender, Workbench, and Navigator for a structured format of training suitable for production uses immediately after the course.<\/p>\n<p>We will actively discuss and play with a set of real Linux offensive use cases vs detection\/forensics view. The hands-on content has been divided into user-space and kernel-space sub-sections. When you are done, dig deeper and create your own custom attack paths, then improve your detection coverage. Purple teaming for life!<\/p>\n<p>If you want to enhance your understanding of Linux x86\/x64 internals and stay prepared for Linux threats, this training is a must-attend! #LinuxSecurity #LiveForensics #CybersecurityTraining<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><strong>Agenda \/ Topics Covered \/ Lab Index<\/strong><\/h5>\n<p>&nbsp;<\/p>\n<h5><strong>1. Current Linux threat landscape<\/strong><\/h5>\n<h5><strong>2. Linux Appliances Exploitation Cases<\/strong><\/h5>\n<h5><strong>3. Purple teaming approach<\/strong><\/h5>\n<h5><strong>4. Threat Hunting vs Incident Response<\/strong><\/h5>\n<h5><strong>5. Linux MITRE ATT&amp;CK<\/strong><\/h5>\n<h5><strong>6. Linux EDR\/Security\u00a0 Products<\/strong><\/h5>\n<h5><strong>7. Basic Linux Investigation tools<\/strong><\/h5>\n<h5><strong>8. General root kits behavior<\/strong><\/h5>\n<h5><strong>9. Hands-on Blue\/DFIR\u00a0 components:<\/strong><\/h5>\n<p style=\"padding-left: 40px;\"><strong>A. HOST:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Host\/Syslog<\/li>\n<li>Host\/Auditd<\/li>\n<li>Host\/Falco Runtime Security<\/li>\n<li>Host\/Tracee Syscall Tracing<\/li>\n<li>Host\/Sysdig Syscall tracing<\/li>\n<li>Host\/Sysmon4Linux<\/li>\n<li>Host\/Velociraptor<\/li>\n<li>Host\/OSQuery FleetDM + osquery-defence-kit<\/li>\n<li>Host\/Sandfly Security<\/li>\n<li>Host\/Wazuh<\/li>\n<li>Host\/CatScale<\/li>\n<li>Host\/UAC<\/li>\n<li>Host\/pspy<\/li>\n<li>Host\/varc<\/li>\n<li>Host\/rkhunter<\/li>\n<li>Host\/Yara FS\/memory Scanning<\/li>\n<li>Host\/LKRG<\/li>\n<li>Host\/SELinux<\/li>\n<li>Host\/Clamav<\/li>\n<li>Host\/Entropyscan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 40px;\"><strong>B. NETWORK:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Network\/Zeek<\/li>\n<li>Network\/Suricata<\/li>\n<li>Network\/Arkime Full Packet Capture<\/li>\n<li>Network\/Forward Proxy Squid SSL Decryption<\/li>\n<li>Network\/WAF Modsecurity<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 4\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<p>&nbsp;<\/p>\n<div class=\"column\">\n<p style=\"padding-left: 40px;\"><strong>C. SIEM:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>SIEM\/Elastic Security introduction<\/li>\n<li>SIEM\/Elastic Security Data sources<\/li>\n<li>SIEM\/Splunk introduction<\/li>\n<li>SIEM\/Splunk Data sources<\/li>\n<li>SIEM\/Graylog intro<\/li>\n<li>SIEM\/Graylog Data sources<\/li>\n<li>SIEM\/Wazuh Introduction<\/li>\n<li>SIEM\/Wazuh Data Sources<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5><\/h5>\n<p>&nbsp;<\/p>\n<h5><strong>10. Baseline vs offensive:<\/strong><\/h5>\n<\/div>\n<\/div>\n<div class=\"layoutArea\">\n<div class=\"column\">\n<ul>\n<li>Process names<\/li>\n<li>Process arguments<\/li>\n<li>Parent-child process relationship<\/li>\n<li>\/proc\/ and \/sys\/ exploration<\/li>\n<li>sysctl<\/li>\n<li>Linker \/ LD_PRELOAD<\/li>\n<li>Linux Kernel Modules\/LKM Off<\/li>\n<li>Dmesg<\/li>\n<li>DNS Settings<\/li>\n<li>Network profiling<\/li>\n<li>Open \/ hidden Ports<\/li>\n<li>iptables<\/li>\n<li>At \/ cron \/ systemd timers<\/li>\n<li>Users<\/li>\n<li>Shell Configuration<\/li>\n<li>Initialization\/systemd scripts<\/li>\n<li>Special File Attributes<\/li>\n<li>File Hashing\/checksums<\/li>\n<li>OS\/application logging behavior<\/li>\n<li>SSH keys vs backdoors<\/li>\n<li>Linux namespaces<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<h5><strong>11. Local\/ Remote Explotation<\/strong><\/h5>\n<ul>\n<li>Reverse Shell \/ Backdoor payloads<\/li>\n<li>File transfers<\/li>\n<li>Apache Tomcat<\/li>\n<li>Apache HTTP CVE-2021-41773<\/li>\n<li>NFS no_root_squash<\/li>\n<li>Dirty Pipe CVE-2022-0847<\/li>\n<li>pkexec CVE-2021-4034<\/li>\n<li>CVE-2022-2588<\/li>\n<li>Spring Cloud Function CVE-2022-22963<\/li>\n<li>Solr Log4j CVE-2021-44228<\/li>\n<li>Kafka CVE 2023-25194<\/li>\n<li>ActiveMQ CVE-2023-46604<\/li>\n<li>Kubernetes KubeGoat<\/li>\n<li>Samba \/ CIFS<\/li>\n<li>Weblogic SSRF<\/li>\n<li>SSH Brute force<\/li>\n<li>Docker escape<\/li>\n<li>Docker Leaky Vessels<\/li>\n<li>Exiftool CVE-2021-22204<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>12. C2 Frameworks \/ C2 shells\/ implants:<\/strong><\/h5>\n<ul>\n<li>Sliver C2 Setup<\/li>\n<li>Sliver Transports and Pivoting<\/li>\n<li>Sliver in details<\/li>\n<li>Meterpreter Setup<\/li>\n<li>Sliver to Meterpreter Sideload<\/li>\n<li>Meterpreter shell_to_meterpreter<\/li>\n<li>TLS\/sniCAT<\/li>\n<li>MerlinSetup<\/li>\n<li>Merlin Transports<\/li>\n<li>Merlin libprocesshider<\/li>\n<li>DNS\/AXFR Payload Delivery<\/li>\n<li>DNS\/Weasel<\/li>\n<li>DNS\/dnscat2<\/li>\n<li>ICMP-based C2 and Exfiltration<\/li>\n<li>Port knocking<\/li>\n<li>Hidden NTP Exfiltration<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5><strong>13. Tunnels \/ pivots \/ redirectors:<\/strong><\/h5>\n<ul>\n<li>SSH Socks Proxy<\/li>\n<li>SSH Tunneling<\/li>\n<li>Reverse SSH<\/li>\n<li>Shootback Protocol Tunneling<\/li>\n<li>SSHimpanzee<\/li>\n<li>FRP Fast Reverse Proxy<\/li>\n<li>socat<\/li>\n<li>Chisel<\/li>\n<li>ngrok<\/li>\n<\/ul>\n<div class=\"page\" title=\"Page 5\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<h5><strong>14. User space rootkits:<\/strong><\/h5>\n<ul>\n<li>General Linux Rootkits behavior<\/li>\n<li>Linux System calls<\/li>\n<li>[US] Rootkits: Shared Library Injection<\/li>\n<li>[US] Rootkits: Oh my Father!<\/li>\n<li>[US] Rootkits: Socket Command Injection<\/li>\n<li>[US] Rootkits: Sneaky Bedevil<\/li>\n<li>[US] ELF injection with ptrace()<\/li>\n<li>[US] ELF injection without ptrace()<\/li>\n<li>[US] Proxy execution with DDexec<\/li>\n<li>[US] In-memory execution with memrun<\/li>\n<li>[US] memfd_vs_no_exec<\/li>\n<li>[US] Fileless Scripting Execution<\/li>\n<li>[US] Rootkits: Dynamic Linker Preloading<\/li>\n<li>[US] Rootkits: Zombie Ant Farm Pypreloader #1<\/li>\n<li>[US] MSF Shellcode from bash<\/li>\n<li>[US] Rootkits: sshd injection<\/li>\n<li>[US] Rootkits: sshd dummy cipher suite<\/li>\n<li>[US] PAM-based Rootkits #1<\/li>\n<li>[US] PAM-based Rootkits #2<\/li>\n<li>[US] PAM-based Rootkits #3<\/li>\n<li>[US] Yum\/RPM Persistence<\/li>\n<li>[US] Rootkits: Apache mod_authg<\/li>\n<li>[US] Rootkits: HTTPD mod_backdoor<\/li>\n<li>[US] Webshells: SOCKS fromJSP<\/li>\n<li>[US] Webshells: meterphp<\/li>\n<li>[US] Webshells: slopshell<\/li>\n<li>[US] Linux Process Snooping<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>15. Kernel space rootkits:<\/strong><\/h5>\n<ul>\n<li>[KS] Rootkits: User mode Helper on ICMP<\/li>\n<li>[KS] Rootkits: In-Memory LKM Loading<\/li>\n<li>[KS] Rootkits: Diamorphine Analysis<\/li>\n<li>[KS] Rootkits: Reptile Analysis<\/li>\n<li>[KS] Rootkits: Suterusu Analysis<\/li>\n<li>[KS] Rootkits: Reveng_rtkit Analysis<\/li>\n<li>[KS] Rootkits: iptables evil bit<\/li>\n<li>[KS] Rootkits: systemtap creds() upgrade<\/li>\n<li>[KS] Rootkits: Netfilter hooking #1<\/li>\n<li>[KS] Rootkits: xt_conntrack.ko Infection<\/li>\n<li>[KS] Rootkits: Ftrace Hooking #1<\/li>\n<li>[KS] Rootkits: bad-bpf trip<\/li>\n<li>[KS] Rootkits: XDP-UDP-Backdoor<\/li>\n<li>[KS] Rootkits: eBPF hooking \/ TripleCross<\/li>\n<li>[KS] Rootkits: eBPF SSL\/TLS text capturing<\/li>\n<li>[KS] Rootkits: eBPF Raw Tracepoint Interception<\/li>\n<li>[KS] Rootkits: eBPF PAM creds stealing<\/li>\n<li>[KS] Rootkits: eBPF KoviD Analysis<\/li>\n<li>[KS] Rootkits: eBPF bpfdoor<\/li>\n<li>[KS] Rootkits: eBPF Hiding with nysm<\/li>\n<li>[KS] Rootkits: ebpfkit Analysis<\/li>\n<li>[KS\/US] Rootkits: Backdooring Initramfs<\/li>\n<li>[ELF] Kiteshield Anti Forensics<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 5\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><strong>16. Linux Memory Forensics:<\/strong><\/h5>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"column\">\n<ul>\n<li>Linux Report\u00a0 Sections<\/li>\n<li>Building Volatility 2\u00a0 Linux Profiles<\/li>\n<li>Building Volatility 3 ISF JSON<\/li>\n<li>Memory Acquisition<\/li>\n<li>Forensics with Volatility2<\/li>\n<li>Forensics with Volatility 3<\/li>\n<li>Fileless plugin<\/li>\n<\/ul>\n<\/div>\n<div class=\"column\"><\/div>\n<div class=\"page\" title=\"Page 6\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<h5><strong>17. Linux Incident Response Playbook<\/strong><\/h5>\n<h5><strong>18. Create your own custom Linux attack path and hunting\/IR procedure.<\/strong><\/h5>\n<p>&nbsp;<\/p>\n<p>The training content focuses on the complete material of the \u201cLinux Attack and Live Forensics At Scale\u201d course:<\/p>\n<p>\u25cf <a href=\"https:\/\/edu.defensive-security.com\/linux-attack-live-forensics-at-scale\">https:\/\/edu.defensive-security.com\/linux-attack-live-forensics-at-scale<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Benefits for Red Teams<\/strong><\/h5>\n<ul>\n<li>Understand the advantages and values of the purple teaming approach in the Linux red\/blue ecosystem<\/li>\n<li>Learn about the full scope of Linux offensive techniques, tools, and the newest community research 2023\/2024<\/li>\n<li>Learn about different detection\/response tools and techniques vs attacks<\/li>\n<li>Learn how to hide effectively in the Linux OS and how to exfiltrate data in<br \/>\nstealthy ways<\/li>\n<li>Learn how to deploy and use C2, low-level rootkits and see this reflected in the<br \/>\ndetection\/DFIR tooling<\/li>\n<li>Get code and command snippets ready to use during your red team and<br \/>\nadversary operations\/emulations<\/li>\n<li>Get experience with Sigma Rules\/Protections Artifacts for staying stealthier<br \/>\nand improving your defense evasion skills at scale<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Benefits for Blue Teams\/DFIR<\/strong><\/h5>\n<ul>\n<li>Understand the advantages and values of the purple teaming approach in the Linux ecosystem<\/li>\n<li>Learn about the full scope of Linux Detection\/Forensics techniques, tools, and the newest community research<\/li>\n<li>Understand the structures of advanced Linux attack paths, how they really work, and how to protect<\/li>\n<li>Learn about different offensive tools that you can use against hackers<\/li>\n<li>See the effectiveness of Detection tooling vs attack emulations<\/li>\n<li>Get experience with Yara\/Sigma Rules for a better understanding of the logic<br \/>\nbehind attacks and needed telemetry<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Benefits for DevOps\/SecOps\/Admins<\/strong><\/h5>\n<ul>\n<li>This knowledge will change the way you look at hardening and monitoring your Linux ecosystems<\/li>\n<li>Recognize security-related enhancements in the modern Linux kernel<\/li>\n<li>Understand current kernel components and programming interfaces used to<br \/>\ncompromise a system<\/li>\n<li>Discover recommended Open Source Security solutions against actual<br \/>\nhands-on attacks<\/li>\n<li>Learn about the full scope of Linux Detection\/DFIR techniques, tools, and the<br \/>\nnewest community research<\/li>\n<li>Understand the advantages and values of the purple teaming approach in the<br \/>\nLinux red\/blue scope<\/li>\n<li>Gain experience in managing many different detection and visibility layers<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite in Bangkok, Thailand DATE: 26-28 August 2024 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 26 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 27 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 28 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours Full access to the PurpleLabs environment for 30 days post-training and lifetime material access (180+ [&hellip;]<\/p>\n","protected":false},"featured_media":13620,"template":"","meta":{"_acf_changed":false},"product_cat":[61,84,57],"product_tag":[],"class_list":{"0":"post-13621","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-bkk-2024","8":"product_cat-in-person","10":"first","11":"outofstock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite in Bangkok, Thailand DATE: 26-28 August 2024 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 26 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 27 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 28 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours Full access to the PurpleLabs environment for 30 days post-training and lifetime material access (180+ [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T04:17:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/\",\"name\":\"Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg\",\"datePublished\":\"2024-02-07T02:34:08+00:00\",\"dateModified\":\"2024-07-29T04:17:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Practical Linux Attack Paths and Hunting for Red and Blue Team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\",\"name\":\"HITBSecConf2024 - Bangkok\",\"description\":\"August 26 - 30 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/","og_locale":"en_US","og_type":"article","og_title":"Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok","og_description":"ATTEND IN-PERSON: Onsite in Bangkok, Thailand DATE: 26-28 August 2024 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 26 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 27 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 28 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours Full access to the PurpleLabs environment for 30 days post-training and lifetime material access (180+ [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/","og_site_name":"HITBSecConf2024 - Bangkok","article_modified_time":"2024-07-29T04:17:42+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/","name":"Practical Linux Attack Paths and Hunting for Red and Blue Team - HITBSecConf2024 - Bangkok","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg","datePublished":"2024-02-07T02:34:08+00:00","dateModified":"2024-07-29T04:17:42+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/02\/leszek.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/product\/practical-linux-attack-paths-bkk2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/shop\/"},{"@type":"ListItem","position":3,"name":"Practical Linux Attack Paths and Hunting for Red and Blue Team"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/","name":"HITBSecConf2024 - Bangkok","description":"August 26 - 30 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product\/13621"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media\/13620"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media?parent=13621"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product_cat?post=13621"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/product_tag?post=13621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}