Hacking By Numbers 'Field Engineering' Edition is a new concept by SensePost. Based on our recent contribution to the 'Penetration Testers Open Source Toolkit'a Syngress publicationField Engineering is a course that explores the challenge of writing and using tools for assessments and penetration testing.
Overview:
Field Engineering focuses solely on the writing and using of tools for assessments and penetration testing. The course will teach the basic programming techniques used to derive world-class assessment tools like Wikto and BiDiBLAH, touching on different programming languages on different platforms. The course will also explore the expert use and optimization of various existing tools that are considered best of breed in this space.
HBN Field Engineering is aimed at experienced penetration testers who are interested in honing their skills and mastering the tools that they use.
Prerequisites
SensePost will provide fully configured laptop computers as well as CDs with all the tools and materials used in the course. Students need to ensure they have the necessary level of skill. This course touches on various different programming languages on different platforms and, as such, requires attendees to have some basic programming experience. However, it is thinking-oriented, not really coding-oriented, and would thus be accessible to even the most novice programmer. A solid practical grasp of fundamental penetration testing tools and techniques is also expected. Students without the requisite technical skills are encouraged to consider ‘Cadet Edition’ or ‘Bootcamp Edition’ first.
Context
This course can be done independently of all the other SensePost courses provided that the skills prerequisites are all met. For students wishing to follow the complete series of courses it is suggested that this course be taken after Bootcamp and before Combat Edition.
Who should attend
Field Engineering Edition is a course for technical security professionals. It is expected that people attending this course are most likely to be involved in some form of technical penetration testing for at least some part of their professional time.
|