Security Workshop | Breakin Labs

Security Workshop

Safety Noobs

Safety pros

Hacking knowledge

Training Best
practice

Learn How to
Think Like Hacker

Understand their intentions and procedures, and learn what techniques hackers use by applying them in hacking lab.

Use the knowledge gained to test the security of your own systems by means of penetration tests and to protect yourself better against future attacks.

Hacking Agendas

Obtaining Information from Open Sources Using Sniffing and Scanning

Password Complexity and Brute Force
Attacks on Passwords

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Analysis Using Nmap Analyzing Network
Traffic with Wireshark

Exploiting Weaknesses of TCP / IP Protocol stacks for man-in-the-middle attacks

Tunneling over firewalls (SSH, ICMP,
DNS tunnels)

Webhacking: exploiting security
vulnerabilities in web applications using

Obtaining Information from Open Sources Using Sniffing and Scanning

Password Complexity and Brute Force
Attacks on Passwords

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Analysis Using Nmap Analyzing Network Traffic with Wireshark

Exploiting Weaknesses of TCP / IP Protocol stacks for man-in-the-middle attacks

Tunneling over firewalls (SSH, ICMP,
DNS tunnels)

Webhacking: exploiting security
vulnerabilities in web applications using

Obtaining Information from Open Sources Using Sniffing and Scanning

Password Complexity and Brute Force
Attacks on Passwords

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Time Memory Trade-Off in Password
Cracking Using Rainbow Tables

Analysis Using Nmap Analyzing Network
Traffic with Wireshark

Exploiting Weaknesses of TCP / IP Protocol stacks for man-in-the-middle attacks

Tunneling over firewalls (SSH, ICMP,
DNS tunnels)

Webhacking: exploiting security
vulnerabilities in web applications using

Target Group

Hacking & Penetration Testing – Basics is aimed at IT professionals and specialists who want to get to know and understand hacker procedures, methods and techniques in order to check the security of their own systems and to better assess the effectiveness of their own defenses.

It provides IT forensics with the gaze of the offender’s goggles and thus the knowledge to make investigations more accurate and efficient.

What You’ll Learn

The training consists of two parts: On the one hand,
general advice on safety and safe development is given.

The second part builds on this and is specifically focused
on a particular topic.

In the general part you will learn, among others, the
following points:

  • Foundations of safe development
  • Architectural considerations
  • Best practices on topics such as authentication or rights
    management
  • Basics of encryption
  • The following specializations we can offer you at the
    moment: Web application: The OWASP Top Ten , HTML5 and security of web services
  • Safety Through Practical
    know-how

    In our 2-day “Penetration Testing & Ethical Hacking” security training, you will actively learn how to handle the tools, gather information, develop attack scenarios, and successfully attack a target system with hands-on labs on your own notebook in the isolated demo network.

    This seminar is particularly suitable for security officers and security administrators as well as IT engineers and IT administrators who want to learn the practical example of “hands-on”, how Bad Guys act and what power lies behind these free tools and procedures.

    Program and Requirements

    The first day focuses on theory blocks on penetration testing and ethical hacking, security principles, attack software, information gathering, and vulnerability-finding strategies. On the second day, we continue to immerse ourselves in the hacking world with topics such as wireless attacks and web / SQL security and, in addition, explore the practical application. In closed systems we learn how attacks work and can be fended off.
    For participation, only the interest in IT security and a laptop with 4 to 8GB of memory and 15GB of hard disk space are required. Operating system knowledge for Windows and Linux is an advantage, but not required. There are no programming or hacking experiences required.

    Ethical Hacking Penetration
    Testing Workshop Leader:

    In our 2-day “Penetration Testing & Ethical Hacking” security training, you will actively learn how to handle the tools, gather information, develop attack scenarios, and successfully attack a target system with hands-on labs on your own notebook in the isolated demo network.

    This seminar is particularly suitable for security officers and security administrators as well as IT engineers and IT administrators who want to learn the practical example of “hands-on”, how Bad Guys act and what power lies behind these free tools and procedures.

    Get The Hacker Right
    In The House

    We’ll show you your security holes and help to close them!