Black Hat Digital Self Defense Training
Trainiing

Note: if the class is overfilled, then you will be wait-listed. You will be contacted should this occur.

training

Black Hat Seattle Training 2005
Red Lion Hotel on Fifth Avenue • October 10-11, 2005

Course Length: 2 days

Cost: US $2000 on or before October 1, 2005, or US $2200 after October 1, 2005.
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered. You must provide your own laptop.

REGISTER NOW

Two Day Course
October 10-11

Infrastructure Attacktecs™ & Defentecs™:
Cisco Voice Over IP (VoIP)

Co-authored by Stephen Dugan, 101Labs & Rodney Thayer

What to bring:
Your laptop with a
both a serial port and FastEthernet NIC. Operating systems on laptops can be either Windows or Linux.

You must provide your own laptop. No loaner laptops will be available.

Attacktecs™ Attack Techniques used to exploit network infrastructure, servers, databases and other services with the intent of stealing or destroying intellectual property and/or to deny users and clients legitimate access.

Defentecs – Defense Techniques and implementation methods used to defend against the latest Attacktecs.

This class will cover a wide variety of the publicly available exploit tools (and some we've created) and how they can be used specifically against Cisco VoIP (Voice over IP) Telephony systems. The training will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant class time will be devoted to both attack and defense techniques. This class is designed to be very hands on and lab intensive. Therefore, a certain level of VoIP experience will be expected, specifically in using Cisco Systems related products.

Students will be using a variety of VoIP gear, Cisco equipment, and open source tools. Students will be required to bring their own laptops (with appropriate caution) to attach to the lab network. Laptops will be used to run attacks against the network and to perform configuration. The labs will require all laptops to have both a serial port and Fast Ethernet NIC. Operating systems on laptops can be either Windows or Linux. The class CD will have tools for both OSs, however some of the tools are only available for certain operating systems.

Some of the topics that will be covered:

  • VoIP architectural vulnerabilities
  • VoIP Threat Models
  • Deployment mistakes and related vulnerabilities
  • Defense requirements for VoIP networks
  • Operational techniques for VoIP network defense
  • H.323 attacks
  • SIP attacks
  • VoIP implementation attacks
  • Designing VoIP security infrastructure
  • Requirements guidelines for secure VoIP products
  • Specific attacks against Cisco Phones and Call Manger

ISC2 CISSP/SCCP CPE Credits
Students are eligible to receive 16 Continuing Professional Education (CPE) credits upon completion of class. Black Hat will automatically forward your information to ISC2.

Course Length: 2 days

Cost: US $2000 on or before October 1, 2005, or US $2200 after October 1, 2005.
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered. You must provide your own laptop.

REGISTER NOW

Trainer:

Stephen Dugan is currently an independent contract instructor and network engineer. He has been teaching Cisco networking for the last several years focusing on Router and Switch configuration, Voice/Data integration, and Network Security. His students come mostly from Fortune 500 companies, government/military and service providers. He also teaches private internal classes to Cisco Employees. As a Network Engineer he has worked on the design and implementation of large enterprise, government, and service provider networks. He is also working on a unique security book covering the aspects of hacking VoIP networks. Although the book has been delayed, it should be out in 2006.

Rodney Thayer is a private network security consultant in Mountain View, California. His practice includes exploit analysis, network security incident investigations, architecting secure networks, and cryptography. His background is in the development and deployment of network security devices, having participated in the development of various implementations of IPsec, SSL (TLS), and digital certificate systems. He has also worked in the area of network management, having done early work on SNMP and participating in the initial development of Counterpane Internet Security's Managed Security Service. He has over 30 years of experience in the design, development, and deployment of networking and security software. He has extensive experience working to standardize network security protocols and practices through organizations such as the Internet Engineering Task force (IETF.) He was a member of the working Group responsible for delivering the first standard specification of the IPsec protocol, and was involved in developing several IETF specifications including RFC 2411 (IPsec), RFC 2440 (PGP), in addition to involvment in work on TLS (web browser/SSL security) and Digital Certificates (X.509/PKI.) He has written and lectured extensively on security matters and has presented work in a variety of forums including Network World, Security Technique, Networld+Interop, and various other lecture and print venues. He is a member of Network World's Test Alliance, The Shmoo Group, and HTCIA.

Black Hat Logo
(c) 1996-2007 Black Hat