Tid | Foredrag |
08.15 | Dørene åpnes |
08.15 – 11.00 | Registrering HackCon#12 |
09.00 – 09.15 |
Administrativ informasjon |
09.15 – 10.00 |
State of the Union For førte gang gis en felles State of the Union gis av FinansCert, KraftCert og TelenorCert. |
10.15 – 11.00 |
These unknown attacks will own your top secure systems - even if they are not connect to Internet - Rogan Dawes - South Africa. An eye opener session on unknown attacks! |
11.15 – 12.00 |
Doing hopscotch, double-dutch, and gymnastics in your network - Joe McCray - US This presentation will cover the newer advanced methods lateral movement, pivoting, tunneling used by hackers today. |
12.00 – 13.00 |
Lunsj |
13.00 – 13.45 |
|
14.00 – 14.45 |
Silent RIFLE: How to take control of all your systems - Kyoung-Ju Kwak – South Korea How they stopped the ultimate meltdown of thousands of systems |
14.45 – 15.15 |
Pause |
15.15 – 16.00 |
|
16.15 – 17.00 |
Catch Me If You Can - Eivind Utnes og Christian A.H. Hansen - Norge Få et unikt innsikt i den operative sikkerhetstilstanden til den norske infrastrukturen og norske virksomheter. |
17.10 | Kåre vinneren av Master of Cyber Security 2016. |
17.30 | Sosialt arrangement Her har du muligheten til å knytte kontakter og blir kjent med andre. nettverket sørger for lett middag og underholdning med mer. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet - en sesjon du ikke vil gå glipp av! |
23.00 | Dørene låses |
Informasjon preHackCon#12
Når du skal melde deg på preHackCon har du mulighet til å krysse av på begge preHackCon kurs under påmeldingen. Dette kan du gjøre hvis du vil sikre deg plass på preHackCon, men er usikker på hvilket kurs du skal velge nå og vil bestemme deg senere. Er du sikker på hvilket kurs du skal gå på, er det viktig at du krysser av på det kurset du skal på. Hvis du bare skal delta på preHackCon, skriv dette i kommentarfeltet og se bort fra at du ikke kan fjerne valget for deltagelse på HackCon. Pris for preHackCon#12 er kroner 6.300,- pr. deltager. Husk det koster 500,- kroner ekstra hvis kun skal delta på preHackCon.
preHackCon#12 vil foregår 13. - 14. februar 2017 på p-hotell i Oslo.
Begge kurs vil ha samme kjøretidspunkt:
Mandag 13. februar 2017: 09.00 - 17.00.
Tirsdag 14. februar 2017: 09.00 - 16.00.
Informasjon om det sosiale arrangementet
Det sosiale arrangementet er en sosial event i regi av HackCon som skjer onsdag kveld (15/2/2017) fra klokken 17.30 - 23.00. Arrangementet er lukket, og er kun for de som deltar på HackCon. Det er gratis å delta på arrangement og vi sørger for mat og underholdning. På det sosiale arrangementet kan du møte kurs/foredragsholderne og andre ressurspersoner innen cyber-/informasjonssikkerhet. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet. For å bestille rett mengde mat og drikke er det viktig at du krysser av om du kommer på det sosiale arrangementet eller ikke. Velkommen skal du være til HackCon familien.
HackCon - Securing critical values through knowledge
* * * * * Complete program HackCon#12 | preHackCon#12 * * * * *
(Scroll down to see program for HackCon#12)
Program preHackCon#12
Mandag 13. – tirsdag 14. | 2 | 2017
PreHackCon kurs#1 - Securing/hacking your systems with PowerShell
PowerShell has changed the way Windows systems/networks are attacked. PowerShell are setting a completely new ball game within Security thinking on Windows platform. PowerShell can interact with .Net, WMI, COM, Windows API, Registry and other computers on a Windows Domain and can be attacked or secured by PowerShell.
PowerShell is an integral development language in today's IT and IT security landscape. A basic understanding of PowerShell are now a must for securing and testing the strength of your system. It is extremely difficult to be an advanced and highly skilled InfoSec Professional without a firm understanding of PowerShell. We have therefore created this unique a 2-day workshop focused on using PowerShell for Information Security tasks. This class are important for you if you want to secure your Windows system from the new attack vectors.
Here are some of the highlights of our PowerShell for Security Professionals training course:
- PowerShell attack frameworks
- System Attacks/pentest with PowerShell
- PowerShell and MetaSploit
- PCAP Parsing and Sniffing
- Log/Malware Analysis
- Parsing with Nessus, Nmap, Powersploit and more
This class is designed specifically for people with little to no programming experience. The class uses the common technical tasks performed by security professionals to teach the language instead of the way that programming is traditionally taught. Technical Level of the training are medium (Intermediate). Students should have some years of InfoSec experience.
Instructor will be Joe McCray. Joe is an Air Force Veteran and has been in security for over 10 years. Joe has been involved in over 150 very high level pentesting assessments and has some major hacking accomplishments that he can share with his classes. His extensive experience and deep knowledge, mixed with his comedic style has lead Joe to be one of the most highly sought after speaking experts in the industry. Joe is the recipient of the 2009 EC-Council Instructor Circle of Excellence Award and the 2010 EC-Council Instructor of the Year Award.
PreHackCon kurs#2 - Advanced securing/hacking your web systems
Most of our e-comers and interaction with our customers, clients and users are through web-applications and web-interface. To protect our web systems is therefore essential to protect our business and organization.
This training will teach you about common and not-so-common (such as XXE, MIME sniffing, etc.) web application vulnerabilities as well as will focus on a specific methodology which is proven to work and gives optimum result during the web application securing/testing. Additionally, we shall also cover about interesting findings reported by researchers in popular bug bounty programs (this in addition to our experience), which will give attendees the real world scenario. Technologies such as WCF, WPF, WebRTC, etc. will be covered so you are aware of various challenges while securing/pen testing such applications.
We will also cover how you should secure your web systems and the challenge endpoint devices are for your web application security. This training will give you good foundation to secure and test your web systems and protect your business and organization. Technical Level is medium (Intermediate). Students should have some years of InfoSec experience. This class are important for you if you want to secure your web systems from the new attack vectors.
This training will be held by Aditya Modha and S. Sonya. Aditya Modha, is a Senior Security Analyst focused on web and mobile applications security assessment. He is a computer science graduate and a Microsoft Certified Technology Specialist. He has carried out security assessment of more than 250 web and mobile applications including core banking solutions and middlewareapplications. He blogs at oldmanlab@blogspot.com.
Sonya is a passionate reverse engineer and software developer focusing on the analysis of malware, covert channels, steganography, and computer network exploitation. Sonya has devoted many hours in academia mentoring students and teaching Computer Science techniques. Sonya have also developed several tool to help security communities secure their systems better. He will show some of them at HackCon so you can improve your security
Program HackCon#12
Onsdag - dag 1, 15. | 2 | 2017
Tid | Foredrag |
08.15 | Dørene åpnes |
08.15 – 11.00 | Registrering HackCon#12 |
09.00 – 09.15 |
Administrativ informasjon |
09.15 – 10.00 |
Foredraget vil bli holdt av Margrete Raaum, Frode Hommedal og Morten Tandle.
|
10.15 – 11.00 |
|
11.15 – 12.00 |
Doing hopscotch, double-dutch, and gymnastics in your network - Joe McCray - US
Joe McCray is a US Air Force Veteran and has been in the IT Security field for over 12 years. He has worked extensively with the medical community, the financial industry, retail, the federal sector, the Department of Defense, 3-letter agencies, and several foreign governments. His technical background is very broad with over 20 industry certifications and experience covering networks, web applications, binary applications, mobile applications and his expertise is in bypassing IT Security Systems.
|
12.00 – 13.00 |
Lunsj |
13.00 – 13.45 |
Will (@harmj0y) is a security researcher and red teamer for Veris Group's Adaptive Threat Division. He is a co-founder of Empire/Empyre, BloodHound, and the Veil-Framework, developed PowerView and PowerUp, is an active developer on the PowerSploit project, and is a Microsoft PowerShell MVP.
Jared (@jaredcatkinson) is the Defensive Services Technical Lead with Veris Group's Adaptive Threat Division. Before working for Veris Group, Jared spent four years leading incident response missions for the U.S. Air Force Hunt Team, detecting and removing Advanced Persistent Threats on Air Force and DoD networks. Passionate about PowerShell and the open source community, Jared is the lead developer of the PowerForensics project (an open source forensics framework for PowerShell) and maintains a DFIR focused blog.
|
14.00 – 14.45 |
|
14.45 – 15.15 |
Pause |
15.15 – 16.00 |
How your virtual machines can be hacked in cloud environment
|
16.15 – 17.00 |
|
17.10 | Kåre vinneren av Master of Cyber Security 2016. |
17.30 |
Sosialt arrangement Her har du muligheten til å knytte kontakter og blir kjent med andre. nettverket sørger for lett middag og underholdning med mer. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet - en sesjon du ikke vil gå glipp av! |
23.00 | Dørene låses |
Torsdag dag 2, 16. | 2 | 2017
Tid | Foredrag |
08.15 | Dørene åpnes |
08.15 – 11.00 | Registrering HackCon#12 |
09.00 – 09.15 |
Administrativ informasjon |
09.15 – 10.00 |
State of the Union For førte gang gis en felles State of the Union gis av FinansCert, KraftCert og TelenorCert. |
10.15 – 11.00 |
These unknown attacks will own your top secure systems - even if they are not connect to Internet - Rogan Dawes - South Africa. An eye opener session on unknown attacks! |
11.15 – 12.00 |
Doing hopscotch, double-dutch, and gymnastics in your network - Joe McCray - US This presentation will cover the newer advanced methods lateral movement, pivoting, tunneling used by hackers today. |
12.00 – 13.00 |
Lunsj |
13.00 – 13.45 |
|
14.00 – 14.45 |
Silent RIFLE: How to take control of all your systems - Kyoung-Ju Kwak – South Korea How they stopped the ultimate meltdown of thousands of systems |
14.45 – 15.15 |
Pause |
15.15 – 16.00 |
|
16.15 – 17.00 |
Catch Me If You Can - Eivind Utnes og Christian A.H. Hansen - Norge Få et unikt innsikt i den operative sikkerhetstilstanden til den norske infrastrukturen og norske virksomheter. |
17.10 | Kåre vinneren av Master of Cyber Security 2016. |
17.30 | Sosialt arrangement Her har du muligheten til å knytte kontakter og blir kjent med andre. nettverket sørger for lett middag og underholdning med mer. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet - en sesjon du ikke vil gå glipp av! |
23.00 | Dørene låses |
Informasjon preHackCon#12
Når du skal melde deg på preHackCon har du mulighet til å krysse av på begge preHackCon kurs under påmeldingen. Dette kan du gjøre hvis du vil sikre deg plass på preHackCon, men er usikker på hvilket kurs du skal velge nå og vil bestemme deg senere. Er du sikker på hvilket kurs du skal gå på, er det viktig at du krysser av på det kurset du skal på. Hvis du bare skal delta på preHackCon, skriv dette i kommentarfeltet og se bort fra at du ikke kan fjerne valget for deltagelse på HackCon. Pris for preHackCon#12 er kroner 6.300,- pr. deltager. Husk det koster 500,- kroner ekstra hvis kun skal delta på preHackCon.
preHackCon#12 vil foregår 13. - 14. februar 2017 på p-hotell i Oslo.
Begge kurs vil ha samme kjøretidspunkt:
Mandag 13. februar 2017: 09.00 - 17.00.
Tirsdag 14. februar 2017: 09.00 - 16.00.
Informasjon om det sosiale arrangementet
Det sosiale arrangementet er en sosial event i regi av HackCon som skjer onsdag kveld (15/2/2017) fra klokken 17.30 - 23.00. Arrangementet er lukket, og er kun for de som deltar på HackCon. Det er gratis å delta på arrangement og vi sørger for mat og underholdning. På det sosiale arrangementet kan du møte kurs/foredragsholderne og andre ressurspersoner innen cyber-/informasjonssikkerhet. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet. For å bestille rett mengde mat og drikke er det viktig at du krysser av om du kommer på det sosiale arrangementet eller ikke. Velkommen skal du være til HackCon familien.
HackCon - Securing critical values through knowledge
* * * * * Complete program HackCon#12 | preHackCon#12 * * * * *
(Scroll down to see program for HackCon#12)
Program preHackCon#12
Mandag 13. – tirsdag 14. | 2 | 2017
PreHackCon kurs#1 - Securing/hacking your systems with PowerShell
PowerShell has changed the way Windows systems/networks are attacked. PowerShell are setting a completely new ball game within Security thinking on Windows platform. PowerShell can interact with .Net, WMI, COM, Windows API, Registry and other computers on a Windows Domain and can be attacked or secured by PowerShell.
PowerShell is an integral development language in today's IT and IT security landscape. A basic understanding of PowerShell are now a must for securing and testing the strength of your system. It is extremely difficult to be an advanced and highly skilled InfoSec Professional without a firm understanding of PowerShell. We have therefore created this unique a 2-day workshop focused on using PowerShell for Information Security tasks. This class are important for you if you want to secure your Windows system from the new attack vectors.
Here are some of the highlights of our PowerShell for Security Professionals training course:
- PowerShell attack frameworks
- System Attacks/pentest with PowerShell
- PowerShell and MetaSploit
- PCAP Parsing and Sniffing
- Log/Malware Analysis
- Parsing with Nessus, Nmap, Powersploit and more
This class is designed specifically for people with little to no programming experience. The class uses the common technical tasks performed by security professionals to teach the language instead of the way that programming is traditionally taught. Technical Level of the training are medium (Intermediate). Students should have some years of InfoSec experience.
Instructor will be Joe McCray. Joe is an Air Force Veteran and has been in security for over 10 years. Joe has been involved in over 150 very high level pentesting assessments and has some major hacking accomplishments that he can share with his classes. His extensive experience and deep knowledge, mixed with his comedic style has lead Joe to be one of the most highly sought after speaking experts in the industry. Joe is the recipient of the 2009 EC-Council Instructor Circle of Excellence Award and the 2010 EC-Council Instructor of the Year Award.
PreHackCon kurs#2 - Advanced securing/hacking your web systems
Most of our e-comers and interaction with our customers, clients and users are through web-applications and web-interface. To protect our web systems is therefore essential to protect our business and organization.
This training will teach you about common and not-so-common (such as XXE, MIME sniffing, etc.) web application vulnerabilities as well as will focus on a specific methodology which is proven to work and gives optimum result during the web application securing/testing. Additionally, we shall also cover about interesting findings reported by researchers in popular bug bounty programs (this in addition to our experience), which will give attendees the real world scenario. Technologies such as WCF, WPF, WebRTC, etc. will be covered so you are aware of various challenges while securing/pen testing such applications.
We will also cover how you should secure your web systems and the challenge endpoint devices are for your web application security. This training will give you good foundation to secure and test your web systems and protect your business and organization. Technical Level is medium (Intermediate). Students should have some years of InfoSec experience. This class are important for you if you want to secure your web systems from the new attack vectors.
This training will be held by Aditya Modha and S. Sonya. Aditya Modha, is a Senior Security Analyst focused on web and mobile applications security assessment. He is a computer science graduate and a Microsoft Certified Technology Specialist. He has carried out security assessment of more than 250 web and mobile applications including core banking solutions and middlewareapplications. He blogs at oldmanlab@blogspot.com.
Sonya is a passionate reverse engineer and software developer focusing on the analysis of malware, covert channels, steganography, and computer network exploitation. Sonya has devoted many hours in academia mentoring students and teaching Computer Science techniques. Sonya have also developed several tool to help security communities secure their systems better. He will show some of them at HackCon so you can improve your security
Program HackCon#12
Onsdag - dag 1, 15. | 2 | 2017
Tid | Foredrag |
08.15 | Dørene åpnes |
08.15 – 11.00 | Registrering HackCon#12 |
09.00 – 09.15 |
Administrativ informasjon |
09.15 – 10.00 |
Foredraget vil bli holdt av Margrete Raaum, Frode Hommedal og Morten Tandle.
|
10.15 – 11.00 |
|
11.15 – 12.00 |
Doing hopscotch, double-dutch, and gymnastics in your network - Joe McCray - US
Joe McCray is a US Air Force Veteran and has been in the IT Security field for over 12 years. He has worked extensively with the medical community, the financial industry, retail, the federal sector, the Department of Defense, 3-letter agencies, and several foreign governments. His technical background is very broad with over 20 industry certifications and experience covering networks, web applications, binary applications, mobile applications and his expertise is in bypassing IT Security Systems.
|
12.00 – 13.00 |
Lunsj |
13.00 – 13.45 |
Will (@harmj0y) is a security researcher and red teamer for Veris Group's Adaptive Threat Division. He is a co-founder of Empire/Empyre, BloodHound, and the Veil-Framework, developed PowerView and PowerUp, is an active developer on the PowerSploit project, and is a Microsoft PowerShell MVP.
Jared (@jaredcatkinson) is the Defensive Services Technical Lead with Veris Group's Adaptive Threat Division. Before working for Veris Group, Jared spent four years leading incident response missions for the U.S. Air Force Hunt Team, detecting and removing Advanced Persistent Threats on Air Force and DoD networks. Passionate about PowerShell and the open source community, Jared is the lead developer of the PowerForensics project (an open source forensics framework for PowerShell) and maintains a DFIR focused blog.
|
14.00 – 14.45 |
|
14.45 – 15.15 |
Pause |
15.15 – 16.00 |
How your virtual machines can be hacked in cloud environment
|
16.15 – 17.00 |
|
17.10 | Kåre vinneren av Master of Cyber Security 2016. |
17.30 |
Sosialt arrangement Her har du muligheten til å knytte kontakter og blir kjent med andre. nettverket sørger for lett middag og underholdning med mer. I år kommer vi også til å ha en spesiell sesjon under det sosiale arrangementet - en sesjon du ikke vil gå glipp av! |
23.00 | Dørene låses |
Torsdag dag 2, 16. | 2 | 2017