Scroll Top

BruCON 0x0D (Virtual) Spring Training (21-23 April) open for registration

We are very happy to bring to you our BruCON 0x0D Spring Training program. Next to Corelan Bootcamp (hosted in-person in Ghent), we bring you a fine selection of 5 virtual courses, being held between April 21st and 23rd.

All students will receive a special student gift package, including a BruCON Mouthmask and a bottle of our special BruCON Z3R0D4Y beer shipped to your place (worldwide shipping!). Early-bird pricing till the end of January !

Without further ado, the line-up!:

(In-person) Corelan Bootcamp – Peter Van Eeckhoutte (3-days) – The Corelan Exploit Dev Bootcamp for Windows 10 is a truly unique opportunity to learn both basic & advanced techniques from an experienced exploit developer, at a conference. During this (typically 3 ‘long’ day) course, students will be able to learn all ins and outs about writing reliable exploits for the Windows platform.  The trainer will share his “notes from the field” and various tips & tricks to become more effective at writing exploits. More information here

(Virtual) SOC-CLASS – BruCON 0X0D edition – Christopher Crowley (3-days) – This course provides a comprehensive picture of a Cyber Security Operations Center (CSOC or SOC). Discussion on the technology needed to run a SOC are handled in a vendor agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well as budgets with global scope. Staff roles needed are enumerated. Informing and training staff through internal training and information sharing is addressed. The interaction between functional areas and data exchanged is detailed. Processes to coordinate the technology, the SOC staff, and the business are enumerated. After attending this class, the participant will have a roadmap (and Gantt chart) for what needs to be done in the organization seeking to implement security operations. More information here

(Virtual) Hacking Enterprises – 2021 Edition – Owen Shearing / Will Hunt (3-days) – This is an immersive hands-on course aimed at a technical audience. Over 3 days we will fully compromise a simulated enterprise covering a multitude of TTP’s. The training is based around modern operating systems, using modern techniques and emphasising the exploitation of configuration weaknesses rather than throwing traditional exploits. This means logical thinking and creativity will definitely be put to the test. More information here

(Virtual) Active Directory for Red and Blue Teams – Advanced Edition – Nikhil Mittal (3-days) – Enterprises are managed using Active Directory (AD) and it often forms the backbone of the complete enterprise network. Therefore, to secure an enterprise from an adversary, it is inevitable to secure its AD environment. To secure AD, you must understand different techniques and attacks used by adversaries against it. Often burdened with maintaining backward compatibility and interoperability with a variety of products, AD environments lack ability to tackle latest threats.

This training is aimed towards attacking modern AD Environment using built-in tools like PowerShell and other trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments. More information here

(Virtual) Hacking and securing Cloud infrastructure – Scott Isaac (3-days) –  This 3-day course cuts through the mystery of Cloud Services (including AWS, Azure, and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical.

This course covers both the theory as well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure. Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial. More information here

(Virtual) Deep Dive into Fuzzing – Dhiraj Mishra / Zubin Devnani (2-days starting Thursday 22nd)– Attendees would be emulating techniques which would provide a comprehensive understanding of “Crash, Detect & Triage” of fuzzed binaries or software. In “Deep dive into fuzzing” we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.

Finding vulnerabilities in software requires in-depth knowledge of different technology stacks. Modern day software’s have a huge codebase and may contain vulnerabilities, manually verifying such vulnerabilities is a tedious task and may not be possible in all cases. This training is designed in such a way that it introduces the concept of fuzzing and vulnerability discovery in software’s covering multiple platforms such as Linux & Windows and triage analysis for those vulnerabilities. More information here

All training details and registration links can be found on the BruCON training pages (link)

your BruCON team.

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.