Hackers Train Security Experts in Digital Attack Methods at HackMiami Conference

Share Article

The HackMiami 2013 Hackers Conference, taking place on Miami Beach, will feature comprehensive training seminars that seek to facilitate the skills of SQL injection, smartphone attacks, and enterprise network breaches.

HackMiami 2013 Hackers Conference - May 17-19, 2013

HackMiami 2013 Hackers Conference - May 17-19, 2013

"The objective is for the student to finish with a feeling of invigoration after having learned new attack methodologies and new useful skillsets that are updated for the current digital threat landscape." - Rod Soto

Hackers will gather in Miami Beach to demonstrate realistic hands-on hacking, training, live seminars and competitions. The Hackmiami 2013 Hacker's Conference seeks to bring together the most skilled individuals within the information security and the digital underground.

The conference will be a weekend of forbidden information being exchanged between those fortunate enough to be able to gain admission. The conference will feature the following training classes taking place on Friday May 17, 2013. Training courses space is limited, and interested students can sign up at HackMiami.com.

Conference Registration: https://hackmiami.com/registration/
Training Registration: https://hackmiami.com/training/

Training Courses - May 17, 2013

The Art of Exploiting SQL Injection – Sumit Siddharth

This all day training course is tailored for penetration testers, system administrators, and web developers to learn advanced SQL database exploitation methods. SQL Injection is a persistent vulnerability that has existed for over a decade, and still remains one of the most exploited vectors in modern data breaches. Even with the deployment of advancing Web Application Firewall (WAF) technology, simple evasion techniques make SQL injection attacks a potent and effective method of application attack. The course is being taught by Sumit Sidharth, a renowned security researcher who has presented at international security conferences such as BlackHat Abu Dhabi.

Hacking and Securing Mobile Devices – Georgia Weidman

How will your organization fair when the smartphone apocalypse arrives? This all day course we will study in-depth the techniques used by hackers to exploit mobile phone platforms and applications. The widespread use of mobile devices within business environments has posed a new vector of exploitation, especially as Bring-Your-Own-Device (BYOD) policies are implemented. This course will go over the basics of smartphone applications, vectors and methods of exploitation, as well as defensive techniques. The course is being taught by Georgia Weidman, a security researcher who developed the Smartphone Pentest Framework and is the founder of Bulb Security.

Own the Enterprise – Penetration Testing Methods, Techniques, and Tools - Rod Soto

This all day training course is perfect for those seeking to enter the information security field as a career, in addition to those seeking to develop the skills and experience needed to succeed as a penetration tester. This course will dive into the theories of gaining unauthorized access, the order of hacking operations, the tools and frameworks required, as well as post exploitation methods and tactics. The course will feature a hands on lab environment where students are encouraged to engage in attack and defense scenarios as a means of understanding hacking methodologies. The course is being taught by Rod Soto, designer of the Kommand && Kontroll CTF, and winner of the 2012 Black Hat Las Vegas CTF contest.

Extreme Hacking Competitions May 18-19, 2013

Kommand && KonTroll CTF

The Kommand && KonTroll CTF is one of the most realistic competitive hacking tournaments ever designed. Real life computer security challenges have been designed that highlight the the latest in malware, web application vulnerabilities and infrastructure attacks.

The Kommand && Kontroll CTF extreme hacking tournament has featured at numerous hacker and security conferences around The United States. Players have included law enforcement, Occupy Wall Street hacktivists, professional exploit developers, professional penetration testers, as well as well known white hat and black hat hacking crews.

"Players do not need to be experts to play Kommand && KonTroll CTF. The game is designed to present players with solvable challenges according to their level of skill," said Rod Soto, designer of the Kommand and Kontrol series. "The goal is for the student finish with a feeling of invigoration after having learned new attack methodologies and new useful skillsets that are updated for the current digital threat landscape."

HackMiami looks forward to participating with the information security community at this memorable South Florida conference.

About HackMiami 2013 Hackers Conference

The HackMiami 2013 Hackers Conference seeks to bring together the brightest minds within the information security industry and the digital underground. This conference will showcase cutting edge hacking tools, techniques, and methodologies that are at the forefront of the global threatscape.

This hacking conference features three days of multiple tracks, comprehensive all day training courses, competitive tournaments, and informational events. Tickets for the conference and trainings are now available at HackMiami.com. In addition to credit cards and other standard payment methods, the HackMiami 2013 Conference is the first hacker conference to accept Bitcoin as an alternative form of payment.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

HackMiami Infromation Desk
Follow us on
Visit website