Violent Python (Hands-On Workshop)

Presented at Diana Initiative 2018, Aug. 9, 2018, 1 p.m. (170 minutes)

It's easy to code your own attacks in Python, even if you have never programmed before. This will up your game beyond only using tools others have written. It only takes a few lines of Python to perform port scans or brute-force attacks, to encrypt and decrypt data, and crack password hashes. For more advanced web attacks, we'll use Chrome Developer Tools and Burp to help build our Python scripts.

Participants need to bring a computer with any OS. The workshop is structured in a Capture the Flag format--partipants will solve a series of challenges and earn points on an automated scoreboard.

The attacks will be explained and demonstrated, and detailed step-by-step instructions are provided to get you started on each category of attack. Tutors will help participants individually as needed to make sure everyone is making progress. Some challenges are easy enough for complete beginners, and the hard ones will interest experienced security professionals.

All the training materials are freely available on the Web to everyone, and will remain available after the conference ends.


Presenters:

  • Sam Bowne - Instructor at CCSF
    Sam Bowne is an instructor at City College San Francisco, and has been teaching hacking and security classes for ten years. He has presented talks and workshops at Defcon, HOPE, RSA, BSidesLV, BSidesSF, and many other conferences. He has a CISSP and a PhD and is like, really smart.
  • Dylan James Smith
    Dylan James Smith has assisted Sam Bowne with classes as a tutor and TA and at hands-on workshops at DEF CON, RSA, B-Sides LV and other conferences. He has worked in and around the computer support and network administration industries since adolescence. Now he’s old(er.) Currently tearing things apart and putting them back together and seeking opportunities to practice and teach "the cybers".
  • Elizabeth Biddlecome
    Elizabeth Biddlecome is a consultant and instructor, delivering technical training and mentorship to students and professionals.   She leverages her enthusiasm for architecture, security, and code to design and implement comprehensive information security solutions for business needs.  Elizabeth enjoys wielding everything from soldering irons to scripting languages in cybersecurity competitions, hackathons, and CTFs.

Links:

Similar Presentations: