Latest news on LayerOne

Subscribe to the RSS Feed

LayerOne 2018 Capture the Flag!

Posted on 26 April 2018 (0)

Capture the Flag is back! This year’s contest is graciously hosted by the folks over at Qualcomm. The game will use a Jeopardy style board with challenges. This contest is for both beginners and experienced CTFers. Challenges will span many domains including web hacking, system hacking, forensics, reverse engineering, and crypto. Registration will be ON SITE, no qualifications necessary.

You can follow the CTF team on twitter at @LayerOneCTF for clues and additional information.

Sincerely,
The LayerOne Staff

One week left for 2018 Early-Bird Training Discounts!

Posted on 25 April 2018 (0)

Don’t forget! Early-bird discounts for 2018 Training ends on May 1st! Head over to the Registration page to book your tickets NOW!

Known for our extremely hands-on, “learn by doing” atmosphere, LayerOne offers full one day trainings on Friday, May 25th, 2018. Click on any training title below to see pricing and training information.

Hands-on Penetration Testing and Ethical Hacking

Presented By: Geoffrey Janjua

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a “must have” for anyone who is ready to jump start their career in penetration testing. Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, printed materials, cheatsheets, compiled exploits, and walkthroughs for each target. Learn more!

Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion

Presented By: Dan Tentler

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt you traffic, create diversions, and other escape and evasion techniques to hide from the blue team. This course focuses on hiding on the network as well as in the system. Both Linux and Windows operating systems will be targeted for this course.Learn more!

Hands-on DevOps Security and AppSec Automation

Presented By: Abhay Bhargav

Application Security is a critical piece of the DevOps puzzle. However, it is severely under-represented in the Continuous Delivery pipeline. Practitioners and Organizations run into problems with Application Security testing in the continuous delivery pipeline, often relying on very basic security tests to provide Application Security Assurance in the Continuous Delivery Pipeline. You need a practical, repeatable and scalable way to deliver Application Security to your product across the Agile and DevOps lifecycle. In this workshop you will receive powerful hands on training on how you can implement scalable and effective security for rapid-release applications.Learn more!

OpenSOC Network Defense Simulation

Presented By: Eric Capuano

OpenSOC is a challenge meant to teach infosec professionals practical incident response skills in an environment that very closely resembles a real enterprise network. The virtual environment includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are actually browsing the Internet, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder’s ability to filter out the noise and find malicious activity on the network. Learn more!

Android Reverse Engineering for Bug Bounties and Vulnerability Hunting

Presented By: Ben Actis

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of dalvik/smali assembly language and basic debugging capabilities. Anyone interested in bug bounties, mobile reversing or developers interested in how others would attack their mobile applications should take this course! Learn more!

2018 Speaker Roster

Posted on 25 April 2018 (0)

LayerOne is proud to announce the 2018 speaker roster!

Aatif Khan – Hacking the Drone
Amit Serper – Adware is just Malware with a Legal Department
Brian Contos – Go Hack Yourself: Moving Beyond Assumption-based Security
Katie Knowles – Signal Safari: Investigating RF Controls with RTL-SDR
Leigh-Anne Galloway & Timur Yunusov – Hack In, Cash Out: Hacking and Securing Payment Technologies
Matthew Stits – From Security to Risk: Shifting the focus and changing the conversation
Matt Hoy – Data Security: How to avoid an embarrassing breach
Robert Adams – How to Security Research Without Getting Sucked into a Courtroom
Rtzq0 – Git for Hackers
Security Panda – HTTP2 and You
Wasabi – Can You Hear Me Now? – Wireless Communication for Pentesters
z0rro – Leeky Onions – Deanonymizing Live Tor Hidden Services

See full details of all presentations and speaker bios over on the Speakers page.

Don’t have your tickets yet? Well, that won’t do. Head over to the registration page to book your tickets now! Interested in attend one of our awesome one-day training seminars on Friday, May 25th? Learn more about this year’s training options on the Training page. The early-bird discount for Training Registration continues until May 1st, but we recommend to book early to make sure your favorite training doesn’t fill up!

While you’re doing your registration, don’t forget to book your hotel room and get a big discount with the LayerOne rate via the direct booking link. More information about this year’s venue on the Venue page, hotel room discount ends on May 11th!

Sincerely,
The LayerOne Staff

Training Spotlight: Android Reverse Engineering for Bug Bounties and Vulnerability Hunting

Posted on 24 April 2018 (0)

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of dalvik/smali assembly language and basic debugging capabilities.

This course is intended for mobile developers, mobile QA personnel, mobile devops personnel, mobile security engineers, mobile security administrators, bug hunters, penetration testers, and anyone else interested in learning about mobile security and bug hunting for mobile platforms.

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff

Training Spotlight: Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion

Posted on 23 April 2018 (0)

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt you traffic, create diversions, and other escape and evasion techniques to hide from the blue team. This course focuses on hiding on the network as well as in the system. Both Linux and Windows operating systems will be targeted for this course.

The target audience for this training are people who do attack as a living and want to increase their chances of staying undetected longer, as well as defenders that wish to learn the tricks the attackers are using. Students should already be familiar with tools like Empire and Metasploit, they should feel at home at the Linux command line, and should have experience attacking or defending already. This is not a course for beginners!

Seating is limited for training events. Don’t wait, register now!

View the training description to learn more about this training! Head to the Training page for more information about our 2018 training lineup!

Sincerely,
The LayerOne Staff