test
test

RedTeam Security Summit
2019  

RedTeam Security Summit
2019  

12 - 13 October 2019 | Sahya Cyberpark, Calicut

12 - 13 October 2019 | Sahya Cyberpark, Calicut

Buy Your Ticket >/a>Buy Your TicketBuy Your Ticket
test
test
test
test

RedTeam Security Summit
2019  

RedTeam Security Summit
2019  

12 - 13 October 2019 | Sahya Cyberpark, Calicut

12 - 13 October 2019 | Sahya Cyberpark, Calicut

Buy Your TicketBuy Your TicketBuy Your Ticket
test
test
test

RedTeam Security Summit
2019  

RedTeam Security Summit
2019  

12 - 13 October 2019 | Sahya Cyberpark, Calicut

12 - 13 October 2019 | Sahya Cyberpark, Calicut

Buy Your TicketBuy Your Ticket

With the world becoming increasingly interconnected the threat to networks, devices, programmes and data from cyber attackers who continue to evolve with ever improving tactics, techniques and procedures presents an ever-growing risk. Foreseeing this mission is what motivated Mr. Jaizal Ali to debut his entrepreneurial skills in the making of RedTeam. RedTeam is a cyber security-based community emphasizing on training, consulting, recruitment and talent solutions. Exploring this opportunity RedTeam is gearing up to organize a cyber security briefing event termed as RED TEAM SECURITY SUMMIT to bring together all the cyber enthusiasts under one roof. The agenda will be to address varied concerns in Critical Infrastructure Security, Cyber Crimes, Blockchain, Artificial Intelligence, Security Operations and come up with potential solutions through cautiously curated security assessment techniques.

Event Speakers

Dinesh O Bareja

CYBER SECURITY SPECIALIST

Gokul Alex

ASSOCIATE DIRECTOR - PWC

Jaizal Ali

FOUNDER AND DIRECTOR AT REDTEAM

Mohan Noone

NEUROLOGIST & MACHINE LEARNING EXPERT

Niranjan Reddy

International Author-Cyber Security and Cyber Forensics Professional

Vaibhav Bedi

Security Researcher

Mishal

CHIEF SECURITY CONSULTANT AT REDTEAM SECURITY LAB

Minhaj V M

ASSOCIATE CONSULTANT AT SISA INFOMATION SECURITY

Hemanth

SENIOR SECURITY CONSULTANT AT REDTEAM

CONFERENCE SCHEDULE

Workshops

Workshop 1 - Red & BlueTeaming - Advanced Cyber Attack and Cyber Defense Workshop.

Red & BlueTeaming – Advanced Cyber Attack and Cyber Defense Workshop.

Red vs Blue  Teaming – Advanced Cyber Attack and Cyber Defense Workshop is an intense hands-on session that emulates real-world cyber-attack and defense scenarios.

This workshop is developed around principles of the Cyber-Kill chain (TM) and techniques used to combat malicious hackers. Attendees will be able to learn the latest hacking techniques used by Red-teams and blue-team counter-response controls.

This workshop enables you to turn the tables on computer attackers by helping you understand their tactics and strategies in detail, giving you hands-on experience in finding security vulnerabilities and discovering intrusions, and equipping you with comprehensive cyber defense skills. Instead of merely teaching a few hack attack tricks, the workshop provides a time-tested, step-by-step process for responding to computer incidents, and a detailed description of how attackers undermine systems so you can prepare, detect and respond to the attack. Students will participate in a hands-on exercises that focuses on scanning, exploiting, and defending systems. The workshop will enable you to discover the potential vulnerabilities in your system before the bad guys do!

  • Active and Passive Intelligence
  • Reconnaissance
  • Advanced Techniques for Exploitation
  • Fire- walking
  • Cyber Defense Techniques
  • Hands-on RedTeam & Blue Teaming Excercises
  • The step-by-step approach used by many cyber attackers
  • Proactive and reactive defenses for each stage of a computer attack
  • How to identify active attacks and compromises
  • How to recover from computer attacks and restore systems for business
  • How to understand and use hacking tools and techniques
  • Strategies and tools for detecting each type of attack
  • Practical Cyber Range Security Assessments
  • How to best prepare for an eventual breach

To get the most value out of this course, students are required to bring their own laptop so that they can connect directly to the workshop network we create. 

Some of the course exercises are based on Windows, while others focus on Linux. VMware Player or VMware Workstation is required for the class. If you plan to use a Macintosh, please make sure you bring VMware Fusion, along with a Windows guest virtual machine.

Workshop 2 - Firmware Reverse Engineering

Firmware Reverse Engineering

Nowadays, hardware and operating system (OS) securities have become

more robust, so hackers and researchers look for exploits in other areas such as firmware. Many IoT devices become vulnerable to cyber attacks because their firmware isn’t updated. One of the instances where we might have heard of firmware security is during the time of Mirai Botnet being widespread. Mirai Botnet infects devices by getting access to the device using default credentials. The question arises, how we can keep our IoT device safe from Mirai or ensure that they are not vulnerable. The basic agenda of this workshop is to aware the security threats into the firmware. Additionally, this workshop will also share doable pointers on how you as a developer can avoid possible security issues in your IoT device at the firmware level. This workshop will take the approach of break it fixes it where the speaker would show techniques on how IoT devices are hacked in a real-world scenario at the firmware level. In addition to this, there will be a discussion on the various case studies of past attacks and common tools and methods used for exploitation.

  • Basic understanding of the firmware
  • Firmware Architecture
  • How to get the firmware image
  • Extracting Firmware
  • Analysis Firmware
  • Firmware Encryption
  • Firmware Analysis Toolkit
  • Backdooring Firmware

 The participant will get extensive experience work with real-time firmware images.

  • They are able to disclose the bugs on the firmware images.
  • This workshop is focused on making a great experience for the participant.

Pre-requisite:

  • Basic knowledge of the IoT
  • IoT architecture
  • Hardware Communication protocol like UART, SPI

Participant Requirements:

  • Laptop with Vmware workstation install

Link to Download

https://my.vmware.com/en/web/vmware/info/slug/desktop_end_user_computing/vmware_workstation_pro/15_0

Ticket Price & Plan

Students

1500
  • Lunch & Tea
  • ​Networking with Speakers
  • Participation Certificate
  • Goodies
Buy Ticket

Professionals

2000
  • Lunch & Tea
  • Networking with Speakers
  • Participation Certificate
  • Goodies
Buy Ticket

CTF winners Will be Rewarded

10000

What are you waiting for?

Days
Hours
Seconds

Sahya, Cyberpark Calicut

Sahya Building, Govt Cyberpark Calicut, Kerala India.

12+ Speakers

Sahya Building, Govt Cyberpark Calicut, Kerala India.

300+ Seats

Sahya Building, Govt Cyberpark Calicut, Kerala India.

Summit 2018

Video Gallery

Supporting Partners
Driving technology for leading brands

Contact Us