trainings



Bugcrowd University




Synopsis
Bugcrowd is happy to offer a full day workshop for bug hunters to learn both intro and advanced topics in web bug hunting. Each BCU module will go over a vulnerability describing it's nature, how to identify it, how to exploit it, relevant tools associated to it, and have labs for students to test their skills. These Bugcrowd University modules are designed to enable the crowd to spot and exploit Priority One level bugs, even in seemingly complex web applications.

(Intro) What makes a good submission

(Intro) Burp Suite Workshop

(Intermediate) Asset Discovery and Recon

(Advanced) XML External Entity Injection

(Advanced) Authorization & Access Control Testing (MFLAC, IDOR)

(Advanced) Server Side Request Forgery

(Advanced) Security Misconfiguration (Git, AWS, Subdomain, ++)

Instructor Jason Haddix
Jason is the Head of Trust and Security at Bugcrowd. Jason works with Bugcrowd to improve the security industries relations with the researchers and design award-winning bounty programs for enterprise clients. Jason’s interests and areas of expertise include mobile penetration testing, black box web application auditing, network / infrastructural security assessments, cursory mainframe security analysis, cloud architecture reviews, wireless network assessment, binary reverse engineering, and static analysis. Jason lives in Santa Barbara with his wife and two children.

Requirements
Laptop

Target Audience
Anyone interested to learn the art of Bug Hunting.

Runtime Full Day Track


Smash the Stack: Writing a Buffer Overflow (Win32) Exploit




Synopsis
What separates a good hacker from a script-kiddie is that they don’t just run the exploit and pray for a shell. A good hacker knows which exploit to use, what it does, and how it works. But what makes a hacker great is that they don’t use exploits developed by others - they develop their own exploits.

This class will teach students to move beyond using exploits developed by others to writing their own ones. Students will learn the Intel x86 architecture, the different registers involved, how the stack works, and how to use a debugger. They will also learn how to cause a crash to an application, control the crash, and embed a payload to gain a shell on the target machine. The students will go through several hands-on exercises that will develop their confidence and creative-thinking skills in writing their own exploits.

Instructor Elvin Gentiles
Elvin is a Security Consultant at Trustwave SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. Elvin has years of experience in network security, as well as web and android application security. He published several security advisories through Trustwave SpiderLabs, and responsibly disclosed several zero days. He also participated in several bug bounty programs, and has been acknowledged and rewarded by Google, Microsoft, Apple, Adobe, and Oracle. Elvin is a CREST Registered Tester, as well as OSCP and OSWP certified.

Prerequisites
Familiarity with Python, and assembly language are helpful but not required.

Requirements
A computer with at least 30 GBs of free space, with Kali Linux running either in a virtual machine or locally. The instructor will provide a copy of Windows systems with pre-installed softwares that will be used during the class.

Target Audience
Anyone interested to learn how to write their own exploits.

Runtime 4 HOURS




Trainings Index

Bugcrowd University

Smash the Stack: Writing a Buffer Overflow (Win32) Exploit