Тренінги

Список тренінгів, які відбудуться на конференції NoNameCon 2019

Andrey Voloshin & Sasha Olenyev

Andrey Voloshin & Sasha Olenyev

TechMaker Car Hacking Training (Language: Ukrainian)

This comprehensive training program covers key attack vectors of a modern car.

Modern cars are equipped with hundreds of ECUs, and the number keeps rising up. All these modules inside vehicles are interconnected using CAN bus. Recently, with the addition of various connected services, a lot of security issues start to emerge as CAN bus was not engineered for operation in such conditions. In the training, we will overview of modern car electronics systems, talk about CAN bus operation theory and discuss various security issues and key attack vectors. We will get to principles behind CAN bus reverse engineering, review various hacking tools & software, and, of course, get to try the learned techniques on a real car.

Agenda:
  • CANbus sniffers, hardware + firmware + desktop utils and protocols
  • ISO-TP, XCP, UDS
  • Desktop utilities: can-utils, SavvyCAN, caringcaribou
  • IVI systems and their attack surface
  • Practice on a real car
  • Extra! Software Defined Radio and keyfobs
  • Extra! Upgrading NoNameBadge to fully featured wireless carhacking device
Buy a seat at Car Hacking training.


Irena Damsky

Irena Damsky

DNS Intelligence (Language: Russian)

Full training description

DNS is the one of the basic layers that holds the Internet together. Without it, not much else works... even malware. In this training we will focus on how to use DNS to the advantage of defending networks. With good techniques it is possible to find a great deal of misuse based on DNS such as DGAs, fast/double flux networks, phishing, and brand impersonation. Tools like passive DNS, whois, and active probing allow defenders to proactively search for malicious indicators before they are operationalized so defenders can get ahead of the attack cycle.

This is a training on the usage of DNS for malware hunting, detection of new infrastructure, discovery of new network assets and other “research” type of products. In this training we will focus on hands on labs while covering also some theory and history of DNS.

Course modules:
  • RECAP - DNS overview
  • Gathering data using DNS
  • Overview of whois information and effects of GDPR
  • Overview of passive DNS (pDNS)
  • Tools
  • Advanced “Research” Topics
  • Pivoting
  • DGAs
  • Malicious domain detection
  • And more
Pre-requisites
  • Basic scripting (Bash/Python)
  • Basic understanding of networking and malware life cycle
Technical requirements: a laptop capable of
  • Running bash / connecting to ssh
  • Running VMs
Buy a seat at DNS Intelligence training.


Aman Sachdev

Aman Sachdev

Himanshu Sharma

Himanshu Sharma

Stepping into a red teamer’s boat – A crash course for pentesters to move beyond standard VA and PT (Language: English)

This course is for all entry-level and experienced pentesters or bug hunters who want to add red team tactics to their skill set by integrating advanced OSINT and Exploitation techniques to their VAPT chores. The objective of the training is to equip you with the methodologies that you can use to not only to find more bugs but also, exploit them and pivot into corporate networks effectively and silently.

We will begin with understanding the importance of extensive OSINT and understand how a malicious hacker can exploit common web and mobile application flaws using automated tools and manual intervention.

We will also look at finding and exploiting vulnerability scenarios that a lot of common tools fail to discover. This will be done by debugging and modifying common exploitation tools and using additional plugins to increase their effectiveness.

Finally, we will understand how to exploit common and uncommon web and mobile flaws to gain access to sensitive information, get inside internal corporate networks protected with Web application and network firewalls and pivoting inside networks and exfiltration data like a ninja.

We will also include case studies of various interesting red team projects that we have executed over the past years.

Prerequisites:
  • Basic understanding of Web application VAPT
  • Understanding of OWASP Top 10 Web and their exploitation
  • Understanding of basic VAPT and exploitation tools like Kali Linux, Burpsuite, SQLmap, Metasploit etc.
  • A decent laptop with Minimum 4GB ram (8GB recommended), with *nix as preferred base OS (or virtual machine)
Agenda:
    Introduction to Red Teaming
  • Why is it important
  • How it differs from standard VAPT
    Various components and aspects of red teaming (Along with real-life case studies)
  • OSINT Tools and Techniques
  • Advance Vulnerability discovery
  • Web and Mobile application Exploitation
  • Customizing exploitation tools for better efficiency
  • Penetrating into servers and corporate networks
  • Bypassing WAFs and Network Firewalls
  • Lateral Movement and Pivoting
  • Privilege escalation
  • Ninja techniques for Data exfiltration
    Other aspects of Red Teaming (Case studies)
  • Physical security breaches
  • Social Engineering & Phishing
    Doubts and Discussions
Buy a seat at Stepping Into a Red Teamer’s Boat training.