Trainiing

Note: if the class is overfilled, then you will be wait-listed until there are enough students to fill a second class. You will be contacted should this occur.

training

USA 2002 Training
Caesars Palace, Las Vegas, NV
July 29-30, 2002

All course materials, lunch and two coffee breaks will be provided.
You must provide your own laptop.

Course Length: 1 day

This class is SOLD OUT

course description
One Day Course
Monday, July 29
JD's Toolbox: Fire and Water
JD Glaser
What to bring:
Students should bring their own network-ready laptops preferably running NT or Win2k with CDRom drive and an open mind. A CD will be provided with reference material, sample code, and utilities. 

This class is focused on exploiting my new Fire and Water Toolkit to maximum effect so that you will know why you need to take Tim Mullen's class, Secure Development of Web Applications.

This detailed course we will cover how use these new tools to probe your network and take apart your web apps. As we use the different tools, we will see how design flaws can be exploited with different techniques of SQL injection, URL manipulation, error/debug code analysis, and other insidious methods.

Development:
During the development phase, we will cover the following:

  • Overview of the new Fire and Water Toolkit as well as my favorite tools
  • Tool history
  • Complete command coverage
  • Advanced command usage
  • How to use tools together effectively
  • How to own Tim Mullen's secured web sites

Course Length: 1 day

This class is SOLD OUT

Trainer:

JD Glaser is the President of NT OBJECTives, Inc. He specializes in Windows NT system software development and COM/DCOM application development. His most recent achievement was the successful formation of NT OBJECTives, Inc., a software company exclusively centered on building NT security tools. Since it's inception, over 100,000 of those security tools have been downloaded and put into practice. In addition, he has written several critical, unique intrusion audit pap ers on NT intrusion forensic issues. Currently, JD has been retained as a featured speaker/trainer for all the Black Hat Conferences on NT security issues.

Black Hat Logo
(c) 1996-2007 Black Hat