Security B Sides Puerto Rico as mentioned before will be a two day event. The seminar will have a cost of inscription of $90 dollars + Local Tax and will include the all day talks on April 5th, 2013 and a workshop of your choosing April 6th, 2013.
Link: Speakers and Talks
Spaces Are Limited
Forensic Analysis on iOS Devices
Pen-testing in the POST-PC era
Love letters to Frank Abagnale
(How do I pwn thee let me count the ways)
Resurrecting Ettercap: Past, Present and Future of Malicious Routing
The Anomaly of when a vulnerability assessment is better than a pentest.
Don’t be Fooled, Scanning Web Applications is not Pen-Testing
Owning Computers Without Shell Access
Practical Persistence With PowerShell
Overcoming Objections to Security in the SDLC with a Special Section on Weaponizing QA Test Scripts
APN functions for e-commerce security
Addition by Subtraction: How Networked Appliances Affect your Security Posture
Advanced Phishing Tactics – Beyond user awareness
Workshop: Armitage and Cobalt Strike Penetration Testing Lab
The Metasploit Framework is a must-have tool for penetration testers. Armitage builds a workflow on top of the Metasploit Framework and exposes its most advanced capabilities. Cobalt Strike augments Armitage with tools to carry out social engineering attacks. This lab oriented class will introduce you to the penetration testing process from the perspectives of Armitage and Cobalt Strike.
You’ll learn how to:
* Choose the right remote or client-side exploit
* Attack with features
* Launch a spear phishing attack
* Control a compromised system
Where to learn more:
Cobalt Strike http://www.advancedpentest.com
Students must bring a laptop with a VMWare product installed. VMWare
player is OK. The instructor will provide attack and target virtual
machines on a DVD. A USB DVD drive will be available to use. Student
systems must have 12GB of free space and at least 2GB of RAM.
Workshop: Power Shell
What is PowerShell
Using the Powershell Help Subsystem
Understating PowerShell Cmdlets
Using PowerShell for Incident Response
Using PowerShell for Enumerations
Using PowerShell for Post-Exploitation
PowerShell in post-exploitation thru a shell
Windows Based computer with Powershell V2 or above.
Workshop: Social Engineering Basics and Beyond
Are you a pen tester in need of social engineering training? Perhaps you just want an understanding of what social engineering is all about.
This workshop has something for everyone.
Throughout this 1 day course we’ll cover the steps of the social engineering process from planning to post-attack. After the basics we’ll
dive into non-traditional topics such as spycraft, acting, pressure sales, the psychology behind them, and how it all applies to the social
engineering that we know and love.
Introduction to social engineering
Elements of communication and why it’s important
Information gathering using technical and non-technical resources
Attacks (technical and non-technical)
Demonstrations of the Social Engineering Toolkit
Laptops are not required, but students are encouraged to bring one with Backtrack 5 if they would like to participate in hands-on exercises.
The register button leads to We Pay:
or follow the link to the online store: