Once again, we are super excited to announce that Blackhoodie is happening at Troopers 2020. This is the 3rd time that Blackhoodie is joining with Troopers. As always, one of the main motivation for Blackhoodie is bringing more women into reversing and other core security topics. So we would like to see more women apply to the training slots. However, if you are not a woman and still feel really excited about Blackhoodie, you are welcome to apply. The registration is open now. Please hurry up and make your registration now. We will close the registration once the seats are filled up with enough quality submissions. We do have a very limited number of seats at this training site. So we apologize in advance if we can’t accommodate everyone, even though we wish we could!
How to register?
Blackhoodie is a free event. In order to register, go to this link and fill in your details with a brief motivation of why you would like to join Blackhoodie. We will get back to you with the selection outcome as soon as the registration is closed. Current deadline for registration is Feb 12th 2020.
When and where?
The event is happening on March 15th, 16th and 17th. We will have an introduction session with lightening talks on March 15th (Sunday) starting at 13:00. On 16th and 17th, there will be workshops. We just have one track with 3 trainings one after the other.
Print Media Academy Kurfürsten-Anlage 52-60 69115 Heidelberg Germany Getting there
15th March 2020 – Ligtening talks starting from 13:00
16th – 17th March 2020 – Trainings
Training 1: How to (mis)use TLS? by Caroline Description: Let’s understand how TLS works and demystify some famous flaws in TLS: what went wrong ? How could we exploit it ? How was is fixed ? To answer this questions, the idea is to get our hands on networking, man-in-the-middle, rogue certificates crafting, heartbleed exploitation. Material: have a kali linux virtual machine installed. If you don’t know how to do that, I can provide an installation guide.
Training 2: Untangling C++: Reversing and Auditing C++ Binaries by Gal Zaban Description: This training is an advanced class for security researchers who want to expand their horizons and skills in reversing modern C++ binaries. C++ Binaries are full of mysteries, they have objects, inheritance, templates, vtables and many more and reverse engineering them is a task on its own. The training will explain advanced C++ reverse engineering topics including techniques and tools for dealing with research of C++ Binaries. We will start with the identification of basic C++ patterns including identifying statics, globals, arrays, etc. Than we will continue with objects and inheritance in a binary and how to represent all of those in IDA, afterward, we will study work methods and design patterns in C++. Finally, we will practice, fight and untangle deep and modern C++ programs using both static and dynamic analysis. Class outline: - C++ Reverse Engineering Intro. - Globals, Statics and Arrays - Objects + Objects Creation. - Inheritance. - Multiple Inheritance. - Understanding relationship between objects. - Virtual tables and virtual calls. - Templates. - Important Design Patterns. - IDA Pro- concepts and working methods for reverse engineering C++. - Representation of C++ objects in IDA. - Tips for creating setup and environment for C++ binaries. - Existing tools for C++. - Deep understanding of a C++ Binary's Logic. - Conclusions and wrap-up. - Suggestions for future tasks and resources to keep learning and improving C++ RE skills.
Training 3: Attacking Active Directory by Kelly Villanueva Active Directory, a service used to manage users, computers, and other objects in corporate networks,is used by almost all large corporations, making it a prime target for exploitation and abuse. Despite efforts to patch existing vulnerabilities and standardize best practices, the security exposure derived from Active Directory increases as environments become more complex, and offensive security professionals can leverage Active Directory to perform activities like lateral movement, credential theft, and reconnaissance. This workshop will provide an overview of Active Directory fundamentals, explain common attack primitives, and use open source tools to get hands-on experience attacking Active Directory.
If you have any further questions, you can contact me by firstname.lastname@example.org.