I L L H A C K ” • An instructor led scenario based training • You start as an attacker with a domain as the target • Chain multiple vulnerabilities and pwn the entire infrastructure • Gain shells, gain confidence and possibly bragging rights
T I F Y A N D E X P L O I T • XWH uses a time tested methodology to teach you the most deadliest of attacks against applications • Learn how to detect the vulnerable parts of an app • Learn how to identify the vulnerability • Learn how to exploit to read system data, explore and attack
WA R T H E R E I S N O S I T U AT I O N A L AWA R E N E S S ✓ L E A R N T H E F U N D A M E N TA L S ✓ P R A C T I C E A G A I N S T R E A L I S T I C TA R G E T S ✓ G A I N I N S I G H T S W I T H S T O R I E S F R O M T H E F I E L D
T S • C R AT E R L A K E B Y A N D Y S P E A R I N G H T T P S : / / W W W. F L I C K R . C O M / P H O T O S / 4 1 0 4 0 5 3 8 @ N 0 5 / 3 7 8 2 4 8 3 1 7 7 • A L L T H E O T H E R P H O T O S U S E D W I T H P E R M I S S I O N F R O M K A R N I V 0 R E