Sunday, June 22, 2014

HOPE X Workshop

HOPE X


I will be teaching an application security workshop at HOPE X, and hope to see you there!

Workshop Title - Extensively Adaptable Sploits and Tools for Encroaching on Router Security
Details


* Extensively Adaptable Sploits and Tools for Encroaching on Router Security will teach attendees penetration testing methodology for testing the security of SOHO routers. This workshop will provide an overview of application security issues commonly found in routers, demonstrate how attackers exploit these issues, and enlighten attendees on common methods used to remediate critical system deficiencies. Throughout this course, attendees will learn the skills necessary to discoverer vulnerabilities and develop custom, reliable exploits.

After attending this workshop, attendees should be more comfortable performing penetration tests against networked systems and discovering vulnerabilities ranging in criticality (i.e., information disclosures to remote code execution).

* Information Gathering
* Discovering and documenting system settings from black and white box perspectives.
* Scanning and Service Enumeration
* Service discovery and verification
* Services enumeration
* Gaining Access
* Analyze web applications
* What to look for
* Tools and Techniques
* Analyze network servers (e.g., FTP, SMB, HTTP)
* What to look for
* Tools and Techniques
* Static Code Analysis (Source Code Review)
* What to look for
* Tools and Techniques
* Dynamic Analysis (Network Service Fuzzing)
* What to look for
* Tools and Techniques
* Reverse Engineering
* What to look for
* Tools and Techniques
* Exploit Development
* Web Application Vulnerability Overview
* OWASP Top 10
* Application Vulnerability Overview
* Buffer Overflows
* Directory Traversal
* Insecure Cryptographic Storage
* Authentication and Authorization
* Misconfigurations
* Information Disclosure
* Social Engineering Overview
* Maintaining Access
* Responsible Vulnerability Disclosure

This workshop emphasizes the “how to” aspect of application security and exploit development. Attendees will be provided with sample binaries for exercises that will be conducted during the workshop, and access to a lab of networked routers where newly learned skills can be applied.

1. Attendees will learn how to discover, exploit, and mitigate vulnerabilities found in network-based equipment. This workshop will focus on exploiting vulnerabilities in routers, but the methodologies presented are applicable to other hardware platforms as well.

2. Attendees will become acquainted with with numerous types application and web application vulnerabilities


Who is the workshop intended for?

* This workshop is suited for a broad range of security professionals, from systems engineers, to those performing security assessments with intermediate to advanced computer science skill sets. This is a fast paced workshop that starts off catering to inexperienced information security professionals by providing a general overview of common vulnerabilities and how they can exploited, but then quickly moves into more advanced topics such as using return-oriented programming (ROP) to exploit stack-based buffer overflows on the MIPS architecture.

Attendees must be familiar with Linux, web attacks (OWASP Top 10), memory corruption attacks (specifically stack-based buffer overflows), and using the command line! Additionally, attendees need be comfortable writing code for proof-of-concept attacks, and reading source code written in various programming languages such as JavaScript and C.

Duration:   3.5 hours
Material cost:  none
Anything for participants to bring?
* Attendees will need a laptop that is capable of running virtual machines and accessing the Internet.
* An updated Kali Linux installation (i.e., a Kali Linux virtual machine configured to use bridge mode networking or a native Kali Linux install).
* The latest version of statically linked Qemu installed on Kali Linux (qemu-user-static).


Workshop Slides - http://securityevaluators.com/knowledge/presentations/HOPEX_HOLCOMB.pdf

No comments:

Post a Comment