{"id":406,"date":"2013-01-15T19:42:14","date_gmt":"2013-01-16T01:42:14","guid":{"rendered":"http:\/\/dc612.org\/?p=406"},"modified":"2013-01-28T16:26:24","modified_gmt":"2013-01-28T22:26:24","slug":"dc612-day-march-9th-2013","status":"publish","type":"post","link":"https:\/\/dc612.org\/index.php\/2013\/01\/15\/dc612-day-march-9th-2013\/","title":{"rendered":"DC612 Day: March 9th 2013"},"content":{"rendered":"<p>This event is a one day hands-on learning\u00a0conference that unlike traditional conferences, this event is geared\u00a0towards hands-on learning. The topics selected are based in input from the community via survey that was completed last fall. Below is the schedule for the day. A buffet style lunch will be provided during the lunch break.<\/p>\n<p><strong>Schedule:<\/strong><\/p>\n<p>8:30am-9am &#8211; Get in, get settled (pastries and coffee available)<br \/>\n9am-12pm &#8211;\u00a0Hands on Penetration Testing 101 by Scott Sutherland &amp; Karl Fosaaen<br \/>\n12pm-1pm &#8211; Lunch (provided by Elsie&#8217;s)<br \/>\n1pm-3pm &#8211;\u00a0Web Application Security: OWASP Top 10 by Brian Johnson<br \/>\n3pm-3:15pm &#8211; Break<br \/>\n3:15pm-5pm &#8211;\u00a0Challenge Walk-through by Spenser Reinhardt<\/p>\n<p>&nbsp;<\/p>\n<p>Beverages will be available all day. Soda is included with admission, beer\/liquor is not.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Registration:\u00a0http:\/\/dc612day.eventbrite.com\/<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Session Details:<\/strong><\/p>\n<p><strong>Title:\u00a0<\/strong>Hands on Penetration Testing 101 by Scott Sutherland &amp; Karl Fosaaen<\/p>\n<p><strong>Abstract:\u00a0<\/strong>The goal of this training is to introduce attendees to standard penetration test methodologies, tools, and techniques.\u00a0 Hands on labs will cover the basics of asset discovery, vulnerability enumeration, system penetration, privilege escalation, and bypassing end point protection.\u00a0 During the labs, common vulnerabilities will be leveraged to illustrate attack techniques, using freely available tools such as Nmap and Metasploit.\u00a0 This training will be valuable to anyone interested in gaining a better understanding of penetration testing or to system administrators trying to understand common attack approaches.<\/p>\n<p><strong>Requirements:\u00a0\u00a0<\/strong>All attendees interested in participating in the labs will need to bring their own laptop.\u00a0 A copy of BackTrack will be provided to all attendees on a USB flash drive that they can keep.\u00a0 Laptops should have a wired Ethernet port in order to participate in labs.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Title:\u00a0<\/strong>Web Application Security: OWASP Top 10 by Brian Johnson<\/p>\n<p><strong>Abstract<\/strong>: In\u00a0this\u00a0session\u00a0we\u00a0will\u00a0learn\u00a0how to find, demonstrate how to exploit and discuss how to prevent the OWASP Top 10 Security Issues. \u00a0We\u00a0will also discuss how these issues are exploited\u00a0in\u00a0the real world. Students\u00a0will\u00a0have the opportunity to have hands on experience testing for and exploiting these issues.<\/p>\n<p><strong>Requirements:\u00a0\u00a0<\/strong>All attendees interested in participating in the labs will need to bring their own laptop.\u00a0 Laptops should have a wired Ethernet port in order to participate in labs.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Title:\u00a0\u00a0<\/strong>Challenge Walk-through by Spenser Reinhardt<\/p>\n<p><strong>Abstract:\u00a0\u00a0<\/strong>Capture the flag challenges, are no easy task and can require vast and intimate knowledge of many different aspects of computer systems. This session will guide participants through a variety of challenges, ranging from application exploitation, forensic image recovery, cryptography, and binary reverse\u00a0engineering. Each task will be challenging and presents something new to learn. By the end, you should have a basic idea of how capture the flag events work, what to expect and an understanding of how to complete a variety of challenge types.<\/p>\n<p><strong>Requirements:\u00a0\u00a0<\/strong>All attendees interested in participating in the labs will need to bring their own laptop.\u00a0 Laptops should have a wired Ethernet port in order to participate in labs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This event is a one day hands-on learning\u00a0conference that unlike traditional conferences, this event is geared\u00a0towards hands-on learning. The topics selected are based in input from the community via survey that was completed last fall. Below is the schedule for the day. A buffet style lunch will be provided during the lunch break. Schedule: 8:30am-9am [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-406","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/comments?post=406"}],"version-history":[{"count":6,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/406\/revisions"}],"predecessor-version":[{"id":411,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/406\/revisions\/411"}],"wp:attachment":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/media?parent=406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/categories?post=406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/tags?post=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}