44CON 2018 Training

All training courses will run between the 10th and 12th September 2018 at the Novotel London West in Hammersmith, just a short distance from the main 44CON venue.

If you are attending the training, here are some key details for you:

Novotel London West
1 Shortlands
Hammersmith
London
W6 8DR

The Training Reception and Registration desk are on the 2nd floor of the Novotel. We initially had a little trouble finding it ourselves so do ask Hotel Reception if you can’t find your way.

44CON Crew will be available on the 2nd floor from 8:15AM for Registration on the first day of your training, there will be coffee and snacks available on arrival between 8:30 and 9:00. Training runs from 9:00 to 17:30.

If you have not received your ticket information via eventbrite please get in touch at registration@44con.com.

Presented by Ashfaq Ansari

This training is the advanced version of Windows Kernel Exploitation Foundation course. In this course we will use Windows 10 RS2 x64 for all the labs. This course starts with the changes in Windows 10 RS2, Internals, hands-on fuzzing of Windows kernel mode drivers. We will understand Pool Internals in order to groom pool memory from user mode for reliable exploitation of pool based vulnerabilities. We will look into how we can bypass KASLR using kernel pointer leaks. We will do hands-on exploitation using Data-Only attack which effectively bypasses SMEP and other exploit mitigation.

Course Length: 3 days (10th-12th September 2018), Novotel London West

Presented By: Dominic Chell, MDSec

The course follows chapters 1-9 of the Mobile Application Hacker’s Handbook, with a strong focus on practical attacks. Over the 2-day training course delivered by the lead author of the book, delegates will learn the tricks and techniques to hack and secure mobile applications on the iOS and Android platforms.

Course Length: 2 days (11th-12th September 2018), Novotel London West

Presented By: Irena Damsky

Security has long ago become more than just malware reverse engineering. To defend your organization, you need to analyze your adversary’s intent, opportunities and capabilities. The tools and skills needed are not only of deep technical nature, but also require one to leverage available intelligence and counterintelligence information and know how to make the most of it.

To become a good intelligence analyst, you need to acquire a different way of thinking – an analytical mindset, which requires getting acquainted with field proven intelligence techniques and methodologies. These will serve as the basis for doing your daily analysis tasks in a much more productive and sophisticated way.

In this course, which will include both lectures and hands on training, we will learn how to look beyond the malware itself in order to dig information on the infrastructure and actor behind it. We will understand the adversary’s intents, way of thinking and the risk it poses against our threat model, to develop the best protections and mitigations. We will get familiarized with tools for gaining insight into attacker’s workflow and learn how to integrate those into the organization.

Course Length: 2 days (11th-12th September 2018), Novotel London West

Presented by: Marcus Pinto and Aaron Devaney, MDSec

The Web Application Hacker’s Handbook (WAHH) Series is the most deep and comprehensive general purpose guide to hacking web applications that is currently available. This course is a practical opportunity to take the skills and theory taught in the book to the next level, experimenting with all of the tools and techniques against numerous vulnerable web applications and labs, under the guidance of the book’s authors. The course also includes new material from the second edition of WAHH, bringing the course right up to date with the latest attacks.

Course Length: 2 days (11th-12th September 2018), Novotel London West

Presented by: Nikhil Mittal

Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch disk, throw executables and use memory corruption exploits without the risk of being ineffective as a simulated adversary. To enhance offensive tactics and methodologies, PowerShell is the tool of choice.

PowerShell has changed the way Windows networks are attacked. It is Microsoft’s shell and scripting language available by default in all modern Windows computers. It could interact with .Net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell.

This training is aimed towards attacking Windows network using PowerShell and is based on real world penetration tests and Red Team engagements for highly secured environments. The course runs as a penetration test of a secure environment with detailed discussion and use of custom PowerShell scripts in each phase.

 Course Length: 3 days (10th-12th September 2018), Novotel London West

Presented by: Saumil Shah

ARM has emerged as the leading architecture in the Internet of Things (IoT) world. The ARM IoT Exploit Laboratory is a 3-day intermediate level class intended for students who want to take their exploit writing skills to the ARM platform. The class covers everything from an introduction to ARM assembly all the way to Return Oriented Programming (ROP) on ARM architectures. Our lab environment features hardware and virtual platforms for exploring exploit writing on ARM based Linux systems and IoT devices.

The class concludes with an end-to-end “Firmware-To-Shell” hack, where we extract the firmware from a popular SoHo router and an IP Camera, build a virtual environments to emulate and debug them, and then build exploits to gain a shell on the actual hardware devices.

 Course Length: 3 days (10th-12th September 2018), Novotel London West

Book your 44CON 2018 training course now!