DeepSec 2018 Training: Advanced Penetration Testing in the Real World – Davy Douhine & Guillaume Lopes

Sanna/ September 24, 2018/ Conference, Security, Training

Guillaume and Davy, senior pentesters, will share many techniques, tips and tricks with pentesters, red teamers, bug bounty researchers or even defenders during a 2-day 100% “hands-on” workshop. This is the very training you’d like to have instead of wasting your precious time trying and failing while pentesting.

The main topics of the training are:

  • Buffer overflow 101: Find and exploit buffer overflows yourself and bypass OS protections. (A lot of pentesters don’t even know how it works. So let’s have a look under the hood);
  • Web exploitation: Manually find and exploit web app vulnerabilities using Burpsuite. (Yes, running WebInspect, AppScan, Acunetix or Netsparker is fine but you can do a lot more by hand);
  • Network exploitation: Manually exploit network related vulnerabilities using Scapy, ettercap and Responder. (Because it works so often when doing internal pentests);
  • Passwords: Optimize the way you attack offline and online passwords. (0day is fun, but the way attackers gain access most of the time is simply by using login/passwords);
  • Mobile app hacking: Find and exploit Android/iOS app vulnerabilities using Needle, Frida, Cycript and Hopper. (Companies move their apps into the cloud and the mobile world so pentesters have to evolve with that… or die);

We asked Davy and Guillaume a few more questions about their training.

Please tell us the top 5 facts about your training.

  1. It’s an hands-on training! Less talk and more exercises.
  2. The goal is to learn techniques that you can apply in real use cases.
  3. Know how hackers perform their attacks.
  4. A variety of subjects are reviewed!
  5. Learn the basics in order to be able to dig deeper into new subjects.

How did you come up with it? Was there something like an initial spark that set your mind on creating this talk / course?

Performing penetration tests (or pentests in short) is our daily job, but it is also a real hobby for us. We like learning new techniques, developing custom scripts or tools and also participating in Capture The Flag (CTF) sessions. After several years of pentest jobs, we found that clients are still amazed by the vulnerabilities we exploit and the techniques we use. This is not black magic! So, the idea of the course is to demystify the penetration test and show the participants how pentests are performed in the real world. In addition, we also wanted to avoid giving a training with just a list of tools and their description.

Why do you think this is an important topic?

Attacks are perform everyday against many companies and lead to data information leakage containing personal, but sometimes also financial information (i.e credit cards). Knowing the techniques allows one to understand the attacks, and, at the same time, to implement the protections to prevent them.

Is there something you want everybody to know – some good advice for our readers maybe?

Information security is evolving very fast and it is difficult to keep up to date on any and every subject. The training could be interesting for people having experience in penetration testing on a specific area (web app, mobile, etc.), or even for people who’d never performed pentests before and are willing to learn. Also, people having defensive experience could be interested to learn how hackers work.

A prediction for the future – what do you think will be the next innovations or future downfalls when it comes to your field of expertise / the topic of your training in particular?

For many years, some have been predicting the end of pentest, arguing that it will be replaced by bug-bounties or automated security audits. Clearly that has not happened yet, the demand is stronger than ever. Artificial intelligence will surely put us out of work one day, but we’re not sure our generation will see that day.

Founder of RandoriSec, a security focused IT firm, Davy Douhine is working in the ITSec field since almost fifteen years. He has mainly worked for financial, banks and defence key accounts doing pentests and trainings to help them to improve their security.

 

 

 

 

 

Guillaume Lopes is working in the pentest field since about 10 years. He has written many ITSec articles and has attended many security conferences.

Share this Post