All too often, we at Attack Research have found that students are not being taught, or are not allowed, to properly perform real-world scenarios. For example, they want to run vulnerability scanners on penetration tests! When we say they are not allowed to perform real-world scenarios, some would say it’s the government or the company that doesn't want the real-world scenario. This might be very true, but those governments and companies received the understanding somewhere that running vulnerability scanners on a penetration test was a good idea, and this understanding came through some form of education. Think of network security back in the late 90's to early 2000's: Real-world attacks really did combine scanning for a vulnerability and then exploiting it. Sasser came along and changed the game, and we then had firewalls, improvements in host configurations, etc. In the early 2000's, we started to see what we currently recognize as training in the industry. This training was based upon the attacks in that time period. Well, the evolution of attack has changed, and so has the defense.
Don't get me wrong; the training industry has also evolved, but not at the rate it did when it first started back in the late 90's and 2000's. Back then, there really wasn't a standard for delivering attack-based training. We have certainly had our fair share of standards since then, but when there is no set standard, it is easier to create a new one than it is to change the current one. Well, it’s time to change that!
Classes at Attack Research are designed to help students with real-world problems. We hope to work at a grass roots level and a management level to change the way governments and companies approach network security. This is why our classes are designed to teach technical-level, real-world content. Not only from an offensive perspective but a defensive one as well. Students will come out of our classes ready to use the skills they learned. They will learn not only how a certain tool is used but the fundamentals behind it so that when they have differing results from the tools, they will know how to handle it or, better yet, they will not use the tool and write their own!
We are proud to announce that Attack Research will be at a
conferences and locations in 2013. Last week, we announced our
Trail of Bits to offer training in the New York City area in
Along with our annual training at Black Hat Las Vegas, we have
Source Conference to provide training at all their conferences.
Boston, we will be offering a 2-day version of our Offensive
training. We will also be at BruCON in September!
Attack Research can transport any of its classes around the
world or at your
own company. If you are interested in private trainings, please
drop us a line
Starting in 2013, we will hold trainings at Attack Research
headquarters in New
Mexico, where we will be offering reduced rates for all classes.
of our classes will be offered at this location, and they are
begin January 29-30. We will debut our brand new class, Operational Post Exploitation. You can register for this class here.
Our list of available classes is:
Offensive Techniques –
Techniques offers students the opportunity to learn real
techniques. The focus is on recon, target profiling and
modeling, and exploitation
of trust relationships. The class will teach students
that follow closely what advanced adversaries do, rather than
penetration testing, and will also teach students how to break
without using exploits.
Post-Exploitation – This
class explores what to do after a successful penetration into a
including introducing vulnerabilities rather than back doors for
such techniques as data acquisition, persistence, stealth, and
management on many different operating systems and using several
Rapid Reverse Engineering
– Rapid Reverse
Engineering is a must
these days with APT-style attacks and advanced adversaries. This
deep reverse engineering subjects with basic rapid triage
techniques to provide
students with a broad capability when performing malware
analysis. This course
will take the student from 0 to 60, focusing on learning the
tools and key
techniques of the trade for rapidly reverse engineering files.
understand how to assess rapidly all types of files.
Attacking Windows — Attacking Windows is
unique approach to actually securing Windows. Students will
in attacking Windows systems, learning the commands that are
available to help
move around systems and data, and examining and employing
detection. It will also cover authentication mechanisms,
password storage and
cracking, tokens, and the domain model. Once finished with this
course, students will have a foundation on how attack models on Windows actually happen and how to secure against them.
Attacking Unix — Attacking Unix is Attack Research’s unique
approach to actually
securing Unix. Students will become proficient in attacking Unix
focusing mostly on Linux, Solaris and FreeBSD. SSH, Kerberos,
file sharing, privilege escalation, home directories, and
logging all will be
covered in depth. Once finished with this course, students will have a foundation on how attack models on Unix actually happen and how to secure against them.
Web Exploitation — The
web is one of
the most prevalent vectors of choice when attacking targets
reside outside the firewall. Web
Exploitation will teach the basics in SQL injection, CGI
management systems, PHP, asp, and other back doors, as well as
the mechanics of
exploiting web servers.
MetaPhishing – MetaPhishing is a class designed to teach the
black arts for
targeted phishing operations, file format reverse engineering
and non-attributable command and control systems. Once
completing this class,
students will have a solid foundation for all situations of
Basic Exploit Development
— In order
to use the tools, one must have an understanding of the basics
of how they
work. Basic Exploit Development will cover the step-by-step
basics, tools, and
methods for utilizing buffer/heap overflows on Windows and Unix.
exploitation on newer Windows systems requires advanced
techniques such as heap
layout manipulation, return oriented programming, and ASLR
In addition, robust exploitation necessitates repairing the heap
execution without crashing the process. Advanced Exploitation
teaching the principles behind these advanced techniques and
gives the students
hands-on experience developing real-world exploits.
This full listing is available on our website as well under the
services/training section. Along with each class, there is a
place to allow for
notification of when the class will be offered next, either at
HQ or at a different location.
I will be releasing some example modules from some of our
classes over the next
few weeks so you can get a feel for what we are offering. If you
questions, please don't hesitate to contact us at email@example.com