Latest news on LayerOne

Subscribe to the RSS Feed

Training Spotlight: Android Reverse Engineering for Bug Bounties and Vulnerability Hunting

Posted on 24 April 2018 (0)

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of dalvik/smali assembly language and basic debugging capabilities.

This course is intended for mobile developers, mobile QA personnel, mobile devops personnel, mobile security engineers, mobile security administrators, bug hunters, penetration testers, and anyone else interested in learning about mobile security and bug hunting for mobile platforms.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion

Posted on 23 April 2018 (0)

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt you traffic, create diversions, and other escape and evasion techniques to hide from the blue team. This course focuses on hiding on the network as well as in the system. Both Linux and Windows operating systems will be targeted for this course.

The target audience for this training are people who do attack as a living and want to increase their chances of staying undetected longer, as well as defenders that wish to learn the tricks the attackers are using. Students should already be familiar with tools like Empire and Metasploit, they should feel at home at the Linux command line, and should have experience attacking or defending already. This is not a course for beginners!

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Hands-on DevOps Security and AppSec Automation

Posted on 20 April 2018 (0)

Application Security is a critical piece of the DevOps puzzle. However, it is severely under-represented in the Continuous Delivery pipeline. Practitioners and Organizations run into problems with Application Security testing in the continuous delivery pipeline, often relying on very basic security tests to provide Application Security Assurance in the Continuous Delivery Pipeline. You need a practical, repeatable and scalable way to deliver Application Security to your product across the Agile and DevOps lifecycle. In this workshop you will receive powerful hands on training on how you can implement scalable and effective security for rapid-release applications.

This course is intended for devops personnel, developers, QA testers, systems administrators, network administrators, and anyone else interested in learning about security automation in modern development and operational environments. This course focuses on the fundamentals of devops automation as is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff

LayerOne 2018 Demo Party!

Posted on 19 April 2018 (0)

Celebrating it’s fourth year running, the LayerOne Demo Party is back again for another year of awesome demos! Demos are a combination of programming challenge, artwork, and music. You’re given specific hardware with any number of restrictions – code size, available memory, processor speed. Your goal is to output audio and video that pushes the limits of what is considered possible with such limited hardware. Here’s some examples of award-winning demos on the Commodore 64, Atari XL/XE, and an 8-bit Atmega88 microcontroller. Not enough? What about a full, three and a half minute 1080p HD demo written in just 4kb of code? Check out elevated by Rgba & TBC.

The LayerOne Demo Board is a 16-bit PIC24F chip with 96K RAM, 256K Flash/ROM. Sounds like a lot, doesn’t it? There’s many nuances to learning about the board and exploring what is possible in such limited hardware. Get inspired by watching last year’s demo party!

Interested in participating? You can order your boards online via Tindie! The L1 Demo Board is also fully open source, so you can make your with the Github code and PCB design.

LayerOne is also hosting a Demo Board Class at Null Space Labs on Saturday, April 28th. Come make your first demo in a friendly, hands-on environment! RSVP for this class on the NSL Meetup event page!

The Demo Party begins on Saturday, May 26th at 18:00 in the Chillout Room. Don’t miss it!

Sincerely,
The LayerOne Staff

Training Spotlight: OpenSOC Network Defense Simulation

Posted on 17 April 2018 (0)

OpenSOC is a challenge meant to teach infosec professionals practical incident response skills in an environment that very closely resembles a real enterprise network. The virtual environment includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are actually browsing the Internet, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder’s ability to filter out the noise and find malicious activity on the network.

This course is intended for blue teamers, security analysts, incident response personnel, forensic investigators, SOC personnel, security administrators, systems administrators, network administrators, and anyone else interested in learning about . This course focuses on the fundamentals of devops automation as is appropriate for beginner to intermediate skill levels.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff