Please click on any Training title below to see pricing and full description.
Note: Please read all Registration Terms and Conditions carefully. Training courses include full access to the Business Hall, Sponsored Workshops, Sponsored Sessions, and Arsenal. Briefings are not included with the purchase of a Training pass; however, you may purchase a Briefings pass to complement your Training course/s once you register. All Briefings and Trainings will be presented in English.
Learn sophisticated, offensive operational tradecraft to attack enterprise environments while evading modern defensive capabilities. Just like high-end adversaries, this course will teach you to compromise a high-security network in a full-scope assessment, utilizing cutting-edge attack techniques. Throughout, you will face live incident responders attempting to detect and remove your presence from the enterprise. Challenge yourself to operate like the enemy. Only through advanced tradecraft will you be able to remain silent while conducting deep penetration into the network.
In this course you will:
*** More seats Added****
The fast-paced course teaches the audience a wealth of hacking techniques to compromise various operating systems and networking devices. The course will cover advanced penetration techniques to achieve exploitation against these platforms:
This is not your traditional SCADA/ICS/IoT security course! How many courses send you home with your own PLC and a set of hardware/RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, and synchrophasors.
Too often, beginner courses assume an already high level of skill and understanding of the subject matter being taught. Our beginner's course is different in that we start at the beginning, and assume you are here to learn how attackers compromise targets, as well as ensuring you get to do the same thing. As the title suggests, it provides an ideal training ground for our other SensePost Training courses, further self-study, or other hacking courses
Dark Side Ops: Custom Penetration Testing focuses on using stealthy techniques, advanced attacks, and custom malware to conduct realistic, targeted penetration tests. Intensive, hands-on labs provides even intermediate participants with a structured and challenging approach to write custom code and bypass the very latest in offensive countermeasures. Participants will also receive and compile source code to create several custom backdoors, RATs, and persistence and privilege escalation techniques as they learn to plan, exploit, pivot, persist, and evade detection in even the most secure networks. The content, backdoors, and techniques provided in the course are constantly updated to reflect the latest in attacker methodologies.
This course teaches hardware hacking and reverse engineering techniques and skills commonly used against electronic products and embedded systems. It is a combination of lecture and hands-on exercises covering the hardware hacking process, proper use of tools and test measurement equipment, circuit board analysis and modification, embedded security, and common hardware attack vectors. The course concludes with a final hardware hacking challenge in which students must apply what they've learned in the course to defeat the security mechanism of a custom circuit board.
This intensive two-day course is designed to teach the fundamental investigative techniques needed to respond to today's landscape of threat actors and intrusion scenarios. The class is built upon a series of hands-on labs that highlight the phases of a targeted attack, key sources of evidence, and the forensic analysis know-how required to analyze them.
After the previous "SOLD OUT" courses at Black Hat, we are now bringing Offensive IoT Exploitation to BlackHat with TONS of new exploit techniques, hardware and SDR exploitation material.
From exploiting unknown IoT devices to your Wi-fi enabled thermostat, Offensive IoT Exploitation will enhance your understanding of IoT architecture and its loopholes. You will learn things like deep firmware analysis, radio communication reversing and serial interfacing . After three successful years at Black Hat, this is the first time we are offering an intermediate course for those who want to take their understanding to the next level.
Offensive Internet of Things (IoT) Exploitation is meant for individuals who already have a basic understanding of IoT and are familiar with penetration testing on some platform. It's a two-day action packed course, full of hands-on exercises and labs in both simulated and real environments. Vulnerable IoT devices will be provided to the students to exploit during the class.
This class will be useful for security professionals or pentesters entering the IoT space, and IoT developers looking to secure their products better. Attendees will also get exclusive access to the latest version of AttifyOS, a custom distro for pentesting IoT devices and environments.
Some of the things we will cover during the 2-days are :
An introduction to digital signal processing, software radio, and the powerful tools that enable the growing array of SDR projects within the hacker community, this course takes a unique "software radio for hackers" approach, building on the participants' knowledge of computer programming and introducing them to the forefront of digital radio technology. Participants will learn how to transmit, receive, and analyze radio signals and will be prepared to use this knowledge in the research of wireless communication security. Each student will receive a HackRF One software defined radio transceiver, a $300 value.