The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.
This introduction to the world of exploit development will teach you how to start writing stack based exploits on the Linux and Win32 platforms. We will break out a couple debuggers to see what buffer overflows look like and discuss methods that take advantage of them. You will learn how basic protection mechanisms behave, such as canaries, and discover ways to circumvent them. In the process, you will come to love how Assembly looks in the dim glow of your monitor and that moving bytes around a stack is not as scary as it sounds. This will be a hands-on class, so prepare to get your feet wet. If you are willing to take the red pill, I'll help you discover how deep the rabbit hole can go.
PowerShell has established itself as the language of choice for anyone that works with Windows and this isn’t limited to just Systems Administrators. Cutting edge Windows attacks and techniques are being developed in PowerShell and are being seen in the wild. As Penetration Testers, it is our job to stay relevant and represent a realistic threat to an environment and now that means knowing how to use PowerShell to attack a network.
This two day course is designed to take people with little to no scripting knowledge and help them learn how to effectively use PowerShell to test a network's security. You’ll learn not just how to use existing offensive tools, but how to create your own scripts and modules to handle various stages of an engagement. We’ll cover common Windows attacks in depth, including how token impersonation works and how relay attacks work. To wrap the course up, you’ll learn about how you can detect PowerShell attacks so that you can defend against them in your own network.