Introduction to Read Teaming and Metasploit
Overview
Red Team Engagements and Penetration tests are both designed to improve the security posture of an organization by exploring risks and exploiting security flaws that are not mitigated by conventional security controls or specifically addressed by regulatory compliance. This workshop will provide students with an overview of the Red Team Test methodology used by current and former members of an NSA Certified Red Team. It will also introduce the… Show more Metasploit Framework (MSF) and provide specific use cases that show how MSF can be utilized during each phase of an engagement / penetration test. Students will then be given an opportunity to apply what they have learned in multiple hands-on exercises.
Date/Location
SRC 1101 Remount Rd Suite 500 North Charleston, SC 29406
Saturday, December 16, 2014 from 9:30 Am to 4:30 PM (EDT)
Lunch is Provided!
Tickets and Pricing
*** A ticket must be purchased in advance in order to attend this training ***
Prices:
Non-ISSA Members: $100
Issa Members: $50
Full Time College Students: $25
A portion of the proceeds from this event will be used to support local charities.
Agenda
.
Terminology and Taxonomy
Overview: A Red Team Methodology
The Metasploit Framework
Red Teaming with MSF
Lab Exercises
For a full detailed agenda, please see the PDF attached here .
What You'll Need / Lab Setup
The course instructors will provide a wireless network with vulnerable systems that you can practice attacking during the course. If you'd like to participate hands on (recommended), you should bring a laptop configured with Kali Linux. You can configure Kali Linux as a Virtual Machine using VMWare Player (http://www.vmware.com/products/player) or VirtualBox (https://www.virtualbox.org/). You can download Kali Linux here: http://www.kali.org/downloads/.
About the Trainers
Micheal Reski graduated from the University of Texas in San Antonio with his Master’s in Information Assurance. He currently serves as the Deputy Director of an NSA-certified Red Team where he conducts full scope Red Team operations with his team members for a variety of agencies and groups. He is also one of the founders of Black Lantern Security Inc., which provides security assessments and vulnerability discovery for commercial business and organization around the low country. He has presented research in artificial intelligence for discovering anomalies within encrypted traffic at Security B-Sides in Charleston.
Jason Miller is a 15-year professional who has operated in various corners of the government sector. He has a Bachelor and Master of Science in Computer Science from the University of Charleston and the Citadel and is currently enrolled as a PhD student at USC's College of Computer Science and Engineering. His experience includes NASA satellite flight operations, Marine Corps command and control (C2), cross-domain solutions (CDS) with the Naval Research Laboratory, and now adversarial security with the Spawar Nsoc red team. His interests include signal analysis, wireless security, and photography.
Questions
If you have any questions, please contact us at info@charlestonissa.org.
Show less