Loading…
BruCON 0x07 has ended
This schedule is subject to change, check back regularly. 
Registrations start at 8h30! 
Workshop rooms in the location Novotel are 5 minutes walking from the main venue. 
IMPORTANT notice on the use of SCHED.org!
back to BruCON web site
TIP: to see as grid: click on the "Schedule button"  
05. La Trappe [clear filter]
Thursday, October 8
 

11:00am CEST

Intrusion detection on Linux and OS X with osquery (https://osquery.io)
Limited Capacity seats available

Osquery is an instrumentation framework for OS X and Linux. It exposes low-level operating system information as virtual SQL “tables” and queries can be grouped in “packs”. In this workshop participants will learn on how Facebook uses osquery for incident response and intrusion detection by analyzing a compromised Linux VM.


Thursday October 8, 2015 11:00am - 1:00pm CEST
05. La Trappe Novotel

2:00pm CEST

Wireless Assessment Bootcamp 101 (4h)
Limited Capacity seats available

Understand the basics on how to conduct 802.11 survey, collection, encryption cracking, and conduct a wireless penetration test.

The hands on and lecture portions expose students to survey, collection, and attack methods used to gain a foothold into a network during a penetration test.

Target audience:

Security beginners or sys admins that would like exposure to basic wireless assessment techniques

Recommended Equipment and Pre-Reqs

Alpha Wireless Cards (SOME may be available from instructor to lend out)

Laptop with Kali Linux virtual machine

Students should be familiar with manipulating networking interfaces from the command line as well as other command line functionality.

Speakers

Thursday October 8, 2015 2:00pm - 6:30pm CEST
05. La Trappe Novotel
 
Friday, October 9
 

11:00am CEST

Hands-on Incident Response (4h)
Limited Capacity seats available

During this workshop attendees will get guidance and practical experience with handling a security incident. Our objective is to confront the students with a real-world scenario and provide them with questions that they need to solve but also with guidance on how to solve these questions. Virtual machines will be provided to each student so that they can practice on their own pace and take these home to continue after the workshop. Two instructors will assist the attendees and demonstrate a typical solution at the end of the workshop.

The malware’s execution needs to be stopped within the 4 hour limit, else all files will have been encrypted and deleted from the workstation.

During the workshop, attendees will be required to provide responses to management and work in teams of 2 people.

Attendees laptop requirements:

  • x86-compatible or x64-compatible 2.0 GHz CPU minimum or higher
  • 4 GB RAM minimum with 8 GB or higher recommended
  • Ethernet adapter for wired network
  • 10 GB available hard-drive space
  • A working copy VMWare Workstation, Fusion or Player to run our virtual images
  • A functioning, non-intoxicated brain

Speakers
EV

Erik Van Buggenhout

Erik is a co-founder of the Belgian cyber security company NVISO. At NVISO, Erik is responsible for the Cyber Resiliency service line, thereby coordinating the delivery of highly technical services such as penetration testing, digital forensics, incident response and malware analysis... Read More →
avatar for Pieter Danhieux

Pieter Danhieux

Secure Code Warrior
Pieter Danhieux is a certified instructor for the SANS Institute teaching military, government and private organizations offensive techniques on how to target and assess organizations, systems and individuals for security weaknesses. Pieter worked seven years at Ernst & Young as one... Read More →


Friday October 9, 2015 11:00am - 4:00pm CEST
05. La Trappe Novotel
 
Filter sessions
Apply filters to sessions.