The Offensive Tooling Foundations workshop will cover the basics of common offensive tools used by security professionals to identify vulnerabilities and exploit them, as well as ways to utilize them more efficiently.
The Offensive Tooling Foundations workshop will cover the basics of common offensive tools used by security professionals to identify vulnerabilities and exploit them, as well as ways to utilize them more efficiently.
Covering topics from reconnaissance and scanning to exploitation and password attacks. We’ll discuss an overview of each tool, its key features and functionality, as well as practical exercises to reinforce how they can be used in real-world scenarios.
This workshop aims to provide an experiential approach to building your offensive toolkit foundation while executing them within the bounds of ethical hacking.
System Requirements
Stable internet access
A computer with a minimum of 8GB of memory (16GB is recommended)
An up-to-date Operating System
VMWare Player/Fusion/Workstation
Administrator access to your computer
Instructor provided VMs
Student Requirements/Prerequisites
Familiarity with virtual machines and lab environments is helpful
Chris began working for Black Hills Information Security (BHIS) in July 2022 as a Penetration Tester, where he is responsible for Pen Testing web apps, mobile app, APIs, and networks. Chris has over 15 years of experience in Web/Mobile App development, QA Automation, and Penetration Testing. Chris is an active member of the GIAC Advisory Board, InfraGard, and The Open Organization Of Lockpickers (TOOOL). He also authors and teaches two Antisyphon classes: Intro to Offensive Tooling and Advanced Offensive Tooling.