Formerly known as a hacking workshop,
G-Con Security Tips & Tricks is just the better way to create
profesionals that can perform self pentesting to a corporative
environment.
G-Con Security tips and tricks is celebrated every month. In this
training you are going
to understand what is a hacker, why hackers do whatever they want to
do, why security
is so easy to brake, and remember you canīt leave the room without
breaking the security
of at least 3 servers and 2 aplications.
In this course you cover the security of:
-Microsoft Windows NT (NT/2000/2003 and XP)
-The Linux kernel in the most common distributions (Redhat/Slackware/Mandrake/Gentoo/etc).
-OpenBSD and FreeBSD
-Web applications and SQL Databases
And learn the most common techniques of:
-Pentesting
-Code Audit
-Scanning
-Shellcoding
-Steganographic and criptographic algorithms
-Forensics (Memory/Disk and Networking)
-Exploit making
-Etc.
Main information:
|
Global Time: |
| -35 Hours (Monday
to Friday 14:00 to 20:00) |
|
Administrative Requirements: |
| -Covered Payment |
| -Copy of your
oficial ID Card. |
| -Signed
Confidential Agreement Contract. |
|
Technical Requirements: |
| -C Language
knowledge |
| -Assembly
Language knowledge |
| -Windows Basics |
| -Unix Basics |
| -Networking
Basics |
| -Teory of
Operative Systems |
|
Objectives: |
| -Learning of the
real network threads |
| -Learning of the
attacking and defense techniques that can be used by hackers |
| -Learning of
networking security |
| -Code generation
to audit and prevent network hacking |
| -Detect common
programation errors |
|
Participant Profile: |
| -Interested in
networks |
| -Interested in
security |
| -Hability to
learn |
|
Included Material: |
| -Presentations
used in the training |
| -Security
Tutorial |
| -Checklists |
| -Exercises |
| -Programs used in
the workshop |
| -Virii Samples
used in the workshop |
|
Modules: |
| -Hackers who are
they? |
| -Anatomy of an
attack |
| -Anatomy of
viruses |
| -How a hacker
works |
| -Gateways to a
network |
| -Network Mapping |
| -Hacking Windows |
| -Hacking Unix |
| -Buffer Overflows
and common programming errors |
| -Forensics
analisis |
| -Application
errors (SQL Injection, include errors, etc). |
| -TCP/IP hacking |
| -Pentesting |
|
Exercises: |
| -Basic and
advanced exercises are going to be generated by the instructor
and the students to lead the entire training |
| -Taking the flag
contest (etical hacking) at the end of the training to secure
the complete understanding of the techniques. |