REGISTER FOR OUR LIVE WEBINAR “PURPLE TEAM PRIMER” JULY 25  12 PM PDT / 3 PM EDT

Events

BLACK HAT USA

August 3 - 6

}

TBA

Las Vegas, NV

A Purple Team View – Attacking And Defending Linux, Docker, And Kubernetes

Jay Beale, CTO, InGuardians

Learn how to attack and thoroughly lock down Linux and container-based systems from Jay Beale, the creator of Bastille Linux, the Center for Internet Security's first Linux Security Benchmark, and Kubernetes security projects including Bust-a-Kube.

In this expanded and updated 4-day version of the well-reviewed Aikido on the Command Line class, we focus strongly on attacking Linux containers, Docker and the container orchestration system, Kubernetes! 

August 3 - 6

}

TBA

las vegas, nv

Assessing And Exploiting Control Systems and IIoT

 Justin Searle, Director of ICS Security, InGuardians

This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home with a $500 kit including your own PLC and a set of hardware/RF hacking tools?!?

 This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT.

DerbyCon

TBA

}

TBA

Louisville, KY

The Backup Operators Guide To The Galaxy

David Mayer, Senior Security Consultant, InGuardians

Backup Operator accounts are ubiquitous and often overlooked by both blue and red teams. These accounts have abusable permissions and are rarely maintained properly. In this talk,  we will examine and demonstrate novel techniques to stealthily compromise Active Directory through the Backup Operator’s account. We will use the Backup Operator account to gain local Admin privilege, establish persistence, and pivot laterally throughout a domain. However, all is not lost in that we can further lockdown our systems and enable auditing measures to deter and detect these attacks.

BruCON

October 7 - 9

}

TBA

Ghent, Belgium

Assessing And Exploiting Control Systems and IIoT

Justin Searle, Director Of ICS Security, InGuardians

This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home with a $300 kit including your own PLC and a set of RF hacking tools?!?

This is not your traditional SCADA/ICS/IIoT security course! How many courses send you home with a $300 kit including your own PLC and a set of RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.