[TriLUG] 10/4 ISSA - Building Metasploit Skills

James Jones jc.jones at tuftux.com
Mon Sep 24 16:12:36 EDT 2012


Alan,

I missed the 2/2011 meeting. :-(

Do you have a count for Jeff Waug's visit in October 2005? It was my
first visit to Trilug and I don't think you could have put any more
people in the Red Hat meeting room.

jcj

On Mon, Sep 24, 2012 at 3:48 PM, Alan Porter <porter at trilug.org> wrote:
>
> Our February 2011 meeting on "Backtrack and Metasploit" was one of the most
> widely-attended TriLUG meetings in recent history... we had over 100 people
> at our meeting!
>
> The very same presenter, Ryan Linn, is putting on another Metasploit
> program, this time for ISSA.
>
> From http://raleigh.issa.org/events.html ....
>
>
> *October Chapter Meeting * - October 4, 2012, at 6:00 PM
>
> /Sponsored By:/ *Raleigh ISSA Chapter <http://raleigh.issa.org/> *
>
> /Location:/ McKimmon Center <http://www.mckimmon.ncsu.edu/mckimmon/> in
> Raleigh, North Carolina located <http://raleigh.issa.org/directions.html> on
> the campus of NC State University.
>
> /Presentation:/*Building Metasploit Skills *
>
> There are books, articles, and demos online on how to use Metasploit, the
> open source penetration testing toolkit. Metasploit is a tool to leverage
> community contributed exploits and tools to profile systems, fingerprint
> services, and then exploit software vulnerabilities and configuration
> weaknesses. Figuring out how to leverage Metasploit is one of the hardest
> steps that new penetration testers have. Come see how to build your skills
> using the Metasploitable distribution, and then see how these same skills
> are applicable in a real penetration test. Once we've gone through some
> basic exploitation, we will do a 15 minute scenario of how quickly a
> penetration test can turn from basic network access to domain admin access
> and more. While many demonstrations have contrived scenarios, this will be a
> walkthrough of one of the most common scenarios we see in daily penetration
> testing, and best of all, it requires no typical exploits to work, just
> configuration weaknesses.
>
> If you decide you want some hands on experience once you've seen some of the
> basics, DC919 has an open invitation to the community to attend a workshop
> on Learning Metasploit with Metasploitable. This workshop will be a two hour
> hands on workshop where you will enumerate open services, find
> vulnerabilities, exploit them to gain access, and then elevate access on a
> target system. For more information go to http://www.dc919.org
> <http://www.dc919.org>.
>
> /Presenter: /*Ryan Linn*, Senior Consultant, Trustwave's SpiderLabs
>
> Ryan Linn is a Senior Consultant with Trustwave's SpiderLabs
> <https://www.trustwave.com/spiderlabs/> - the advanced security team focused
> on penetration testing, incident response, and application security. Ryan is
> a penetration tester, an author, a developer,and an educator. He comes from
> a systems administration and Web application development background, with
> many years of IT security experience. Ryan currently works as a full-time
> penetration tester and is a regular contributor to open source projects
> including Metasploit and BeEF, the Browser Exploitation Framework.
>
>
>
> --
> # ????o? u?l?
>
>
> --
> This message was sent to: jc jones <jc.jones at tuftux.com>
> To unsubscribe, send a blank message to trilug-leave at trilug.org from that
> address.
> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug
> Unsubscribe or edit options on the web  :
> http://www.trilug.org/mailman/options/trilug/jc.jones%40tuftux.com
> TriLUG FAQ          : http://www.trilug.org/wiki/Frequently_Asked_Questions



-- 
Jc Jones
Blogs -
http://www.wendellgeek.com/weblog/
http://kixtech.blogspot.com/

webmaster for:
http://www.wendellgeek.com
http://classof1955.org
http://www.tuftux.com
http://www.therealpatpatterson.com
http://jonesjc.freeshell.org
http://www.trilug.org/~jonesjc



More information about the TriLUG mailing list