Workshops

 
Workshops will run throughout GrrCON and do require an additional ticket and have limited space. The small cost is to ensure attendees who sign up intend to participate. The cost is approximately $5, but seating is limited

VIPs interested in attending a workshop for free must contact Marketing to receive instructions on signing up.
 
Windows Post-Exploitation: Entry Level – Workshop
This workshop familiarizes the attendees with the basics of network hacking. A number of tools and techniques will be taught during the 2 days workshop.

We will focus on providing value to attendees by avoiding metasploit as much as possible. Metasploit, being arguably the most popular tool for aspiring hackers, has a wealth of information already out there. From youtube to every other blog about hacking, there is an extensive amount of information anyone can access. Often times, an exploit module will not work in Metasploit or is not needed at all. This course will help attendees go beyond Metasploit to broaden their offensive knowledge. If you want to step into the world of ethical hacking/pentesting, then this is the right course for you. Attendees will be exposed to how we leverage pre-installed windows tools, as well as open-source tools such as the impacket collection, crackmapexec, and the Empire framework.

Difficulty level:
This course lies somewhere between entry level and intermediate.

Who can attend + prerequisites:
Everyone is welcome. It is recommended that attendees have basic command line knowledge on Windows and Linux platforms. Attendees should feel comfortable performing actions such as navigiating directory structures, text manipulation with grep, cut, sed, etc., and basic git commands.
 
When: 10/24/2019, 10am




Trainers: Viet Luu
Richard Young
Farhan Mohammed
Ismail Saifudin

Eventbrite

 
Professionally Evil Container Hackery
In this workshop we’ll cover some of the basics of containerization and container orchestration tools. From there we will cover several reconnaissance, pivoting, and exploitation techniques. This includes small docker based labs to attacking a localized Kubernetes cluster that has been configured insecurely!

Difficulty level:
Fair warning: This content is fairly advanced and as such assumes familiarity with Linux, Bash, APIs, and general information security concepts. .


Prerequisites:
Approximately 2 weeks prior to the class students should download and set up the lab VM and check to make sure it is accessible. Feel free to get in touch if you run into issues!
  • A laptop (>=16gb RAM recommended)
  • Virtualbox (You may convert the lab VM to work with other hypervisors if you wish)

  • P.S. Don’t forget your laptop charger.
     
    When: 10/24/2019, 10am




    Trainers:
    Cory Sabol
    Jason Gillam


    Eventbrite

     
    Investigating with Splunk
    A hands-on workshop designed to help security practitioners improve their hunting and incident response capabilities by providing them scenario based walkthroughs against real world data sets..

    Difficulty level:
    This course lies somewhere between entry level and intermediate.

    Prerequisites:
    Basic skill searching in Splunk. Free prep class here: https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html
    Students must bring their own laptop

     
    When: 10/25/2019, 10am




    Trainer: Robert Wagner
     
    Eventbrite

     
    Detection and Response with Kubernetes
    A hands on workshop designed to teach you how to perform detection and response with Kubernetes
    This course will provide technical professionals with the skills to design, implement and respond to incidents in a Kubernetes environment. Kubernetes is the latest technology developers and businesses are adopting. Whether 100% cloud, 100% on-prem, or more likely somewhere in between, your organization will benefit from this technology.
     
    During this course, you will learn:
    – The benefits of containers and Kubernetes
    – Instrumentation needed ahead of time
    – How to detect an intrusion into your containers/pods
    – How to respond to an intrusion
    Prerequisites:
    Students must bring their own laptop


     
    When: 10/25/2019, 10am




    Trainer: Brett Cunningham
     
    Eventbrite

     

     
     

    Registration:

    Price $5
    This training is open to registered GrrCON attendees ONLY.
    YOU MUST HAVE A SEPARATE TICKET FOR GrrCON TO REGISTER FOR ANY TRAINING OR IT WILL BE VOIDED.
    This training does NOT include a ticket for GrrCON

    -= PLEASE NOTE: YOU MUST HAVE A SEPARATE TICKET FOR GrrCON TO ATTEND ANY WORKSHOP! =-