<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ebiddlecome</id>
	<title>HOPE Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ebiddlecome"/>
	<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php/Special:Contributions/Ebiddlecome"/>
	<updated>2026-04-26T17:27:45Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.3</generator>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Intro_to_Attack_Techniques_workshop&amp;diff=546</id>
		<title>Intro to Attack Techniques workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Intro_to_Attack_Techniques_workshop&amp;diff=546"/>
		<updated>2020-07-23T21:54:44Z</updated>

		<summary type="html">&lt;p&gt;Ebiddlecome: Incident Response and the ATT&amp;amp;CK Matrix Workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Learn how to take over Windows, Linux, and Android systems, and how to&lt;br /&gt;
defend them.  We begin with common tools: Nmap, Metasploit, and&lt;br /&gt;
Armitage, and then go into buffer overflows, packet crafting, command&lt;br /&gt;
injection, and SQL injection.&lt;br /&gt;
&lt;br /&gt;
No previous experience with programming or attacking is required.&lt;br /&gt;
&lt;br /&gt;
Participants need a credit card and a few dollars to rent Google Cloud&lt;br /&gt;
servers. We will use Debian Linux and Windows Server 2016 systems. All&lt;br /&gt;
the tools we will use are freely available, and all the training&lt;br /&gt;
materials will remain available to everyone after the workshop ends.&lt;br /&gt;
&lt;br /&gt;
Visit [https://samsclass.info/ samsclass.info] to access the workshop materials.&lt;/div&gt;</summary>
		<author><name>Ebiddlecome</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Securing_Web_Apps_workshop&amp;diff=545</id>
		<title>Securing Web Apps workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Securing_Web_Apps_workshop&amp;diff=545"/>
		<updated>2020-07-23T21:52:41Z</updated>

		<summary type="html">&lt;p&gt;Ebiddlecome: Created page with &amp;quot;Participants will attack Web applications with: command injection; SQL injection; Cross-Site Request Forgery; Cross-Site Scripting; cookie manipulation; and Server-Side Templa...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Participants will attack Web applications with: command injection; SQL&lt;br /&gt;
injection; Cross-Site Request Forgery; Cross-Site Scripting; cookie&lt;br /&gt;
manipulation; and Server-Side Template Injection. We will also exploit&lt;br /&gt;
Drupal and SAML. We will then implement network defenses and&lt;br /&gt;
monitoring agents. We will use Burp, Splunk, and Suricata.&lt;br /&gt;
&lt;br /&gt;
Prerequisites: participants should know basic security and networking.&lt;br /&gt;
Experience with Web development is helpful but not necessary.&lt;br /&gt;
&lt;br /&gt;
The workshop is structured in a CTF format. Each participant works at&lt;br /&gt;
their own pace. The techniques will be demonstrated, with complete&lt;br /&gt;
step-by-step instructions to lead beginners through the easy&lt;br /&gt;
challenges. There are also harder challenges for more experienced&lt;br /&gt;
participants. We will help participants as needed, to ensure that&lt;br /&gt;
everyone learns new techniques.&lt;br /&gt;
&lt;br /&gt;
Participants need a credit card (which won&#039;t be charged) to reserve a&lt;br /&gt;
free Google Cloud server. All the tools we will use are freely&lt;br /&gt;
available, and all the training materials will remain available to&lt;br /&gt;
everyone after the workshop ends.&lt;br /&gt;
&lt;br /&gt;
Visit [https://samsclass.info/ samsclass.info] to access the workshop materials.&lt;/div&gt;</summary>
		<author><name>Ebiddlecome</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Incident_Response_workshop&amp;diff=544</id>
		<title>Incident Response workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Incident_Response_workshop&amp;diff=544"/>
		<updated>2020-07-23T21:49:29Z</updated>

		<summary type="html">&lt;p&gt;Ebiddlecome: Incident Response and the ATT&amp;amp;CK Matrix Workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Practice techniques to detect, analyze and respond to intrusions. We&lt;br /&gt;
will construct targets and attackers on the Google cloud, and send&lt;br /&gt;
attacks using Metasploit and Caldera to emulate APT attackers. We will&lt;br /&gt;
monitor and analyze the attacks using Splunk, Suricata, Sysmon,&lt;br /&gt;
Wireshark, Yara and online analysis tools including PacketTotal and&lt;br /&gt;
VirusTotal.&lt;br /&gt;
&lt;br /&gt;
We will cover the ATT&amp;amp;CK Matrix in detail, which enumerates threat&lt;br /&gt;
actors, tactics and techniques, so red and blue teams can better&lt;br /&gt;
communicate and work together to secure networks.&lt;br /&gt;
&lt;br /&gt;
The workshop is structured in a CTF format. Each participant works at&lt;br /&gt;
their own pace. The techniques will be demonstrated, with complete&lt;br /&gt;
step-by-step instructions to lead beginners through the easy&lt;br /&gt;
challenges. There are also harder challenges for more experienced&lt;br /&gt;
participants. We will help participants as needed, to ensure that&lt;br /&gt;
everyone learns new techniques.&lt;br /&gt;
&lt;br /&gt;
Participants need a credit card and a few dollars to rent Google Cloud&lt;br /&gt;
servers. We will use Debian Linux and Windows Server 2016 systems. All&lt;br /&gt;
the tools we will use are freely available, and all the training&lt;br /&gt;
materials will remain available to everyone after the workshop ends.&lt;br /&gt;
&lt;br /&gt;
Visit [https://samsclass.info/ samsclass.info] to access the workshop materials.&lt;/div&gt;</summary>
		<author><name>Ebiddlecome</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Incident_Response_workshop&amp;diff=543</id>
		<title>Incident Response workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Incident_Response_workshop&amp;diff=543"/>
		<updated>2020-07-23T21:25:14Z</updated>

		<summary type="html">&lt;p&gt;Ebiddlecome: Incident Response and the ATT&amp;amp;CK Matrix Workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Practice techniques to detect, analyze and respond to intrusions. We&lt;br /&gt;
will construct targets and attackers on the Google cloud, and send&lt;br /&gt;
attacks using Metasploit and Caldera to emulate APT attackers. We will&lt;br /&gt;
monitor and analyze the attacks using Splunk, Suricata, Sysmon,&lt;br /&gt;
Wireshark, Yara and online analysis tools including PacketTotal and&lt;br /&gt;
VirusTotal.&lt;br /&gt;
&lt;br /&gt;
We will cover the ATT&amp;amp;CK Matrix in detail, which enumerates threat&lt;br /&gt;
actors, tactics and techniques, so red and blue teams can better&lt;br /&gt;
communicate and work together to secure networks.&lt;br /&gt;
&lt;br /&gt;
The workshop is structured in a CTF format. Each participant works at&lt;br /&gt;
their own pace. The techniques will be demonstrated, with complete&lt;br /&gt;
step-by-step instructions to lead beginners through the easy&lt;br /&gt;
challenges. There are also harder challenges for more experienced&lt;br /&gt;
participants. We will help participants as needed, to ensure that&lt;br /&gt;
everyone learns new techniques.&lt;br /&gt;
&lt;br /&gt;
Participants need a credit card and a few dollars to rent Google Cloud&lt;br /&gt;
servers. We will use Debian Linux and Windows Server 2016 systems. All&lt;br /&gt;
the tools we will use are freely available, and all the training&lt;br /&gt;
materials will remain available to everyone after the workshop ends.&lt;/div&gt;</summary>
		<author><name>Ebiddlecome</name></author>
	</entry>
</feed>