Starting August 11th 2020, Budapest - Training

Adversary Simulation

You will learn topics ranging from programming (C/C++, C#, VBA, Python), Malware, C2, Social Engineering, Tool & Lab Building, some Reverse Engineering, AV/EDR Evasion, OSINT, Machine Learning, Phishing, and more in the this 2 week live Adversary Simulation training.

Training

Overview

As attackers become more and more inovative, using both low level assembly at the bottom end all the way through the OSI model up to using Machine Learning automation at the top end of the corporate IT stack to achieve their aims, attackers need to adapt.

This live training will teach you what you need to know across the full stack, simplified into repeatable, QA'ed ordered processes to take on advanced, mature organisations and governments using Advanced Persistent Threat tactics and those devised at Hunnic Cyber.

You will be pushed hard, with multiple trainers delivering specialised seminars in the relevant areas, practice on virtual labs, perform the actions yourself and take home custom Hunnic Cyber software, methodologies and tactics available internally only.

This is our flagship training, and has a number of pre-requisites outlined below.

Hunnic Cyber - Welcome

Training

Highlights

ICS, AV & AD LAB

To effectively conduct Red Team operations across the entire corporate PP&T stack, you will need lab environments fits for purpose. In the training you will learn to build, manage and maintain a complete Red Team lab with an AV farm, Active Directory environments for payload testing, and an ICS lab.

Practical Red Teaming

As part of the training, you will have access to multiple environments to perform phishing, OSINT, malware development & execution, Reverse Engineering, Command & Control Design and automation, test various techniques and perform QA's of your entire technical procedure.

Extensive Theory

This training will introduce you to the three layers targeted - technology, people and processes, and how one can effetively combine and compromise mature global organisations and governments by taking advantage of failings in this layered stack and how to remain undetected, hide your C2 and movements.

Training

Pre-requisites

Hardware & Software

A properly configured system is required to fully participate in this course with minimum requirements below:

CPU - 64-bit Intel i5/i7 2.0+ GHZ processor
Enabled "Intel-VT"
USB3.0 Type-A port
16 GB RAM
100GB Free space
Windows 10 Pro/Enterprise with WSL2

"

Technical Knowledge

It is recommended that you have a general understanding of how programming is done, some understanding of networking, are familiar with standard and non standard protocols used in TCP & UDP network communications, have played with a debugger, and have conducted some penetration testing.

While all areas of the course will be explained in depth, to complete you will require focus, attention, hard work and an open mind!

Attendence

Certification

On completion of the training, Hunnic Cyber will present trainees with a certification, similar to the sample pictured, and receive both a digital and hard copy print of the certificate.

This training will certify that you can complete complex Adversary Simulation exercises, from a blank slate, social engineer entry into the organsation using world class deception methodology, fake referencing and digital assets, hide command & control origin, traffic and communication, deploy persistence, to achieving information and operational dominance in the target network, with an ability to exfiltrate highly sensitive data, completely compromise finanical assets, further social engineer high value targets within the network, and maintain persistence until the engagement is over, leaving behind no trace or identifiable attribution of long term exploitation.

Some attention will be paid to reporting, providing insight as to what issues were identified, and how to present this information in a way that senior management, and technical & remeadiation teams can address issues within the organisation, based on the philsophy of "zero trust".

Enrol on

Course

Hunnic Cyber - Application Testing

August 11th 2020 - 11 Spots

First of three trainings to take place this year.

  • Inquire for Pricing
  • One Off
  • Tools & Course Notes Included
  • Full bed & board & airport transfer
  • 10 Full Training Days
  • EU Ex-Armed & Special Forces personnel will automatically get a 50% discount for their service.


  • MAKE INQUIRY
Hunnic Cyber - Adversary Simulation

September 11th 2020 - 11 Spots

Second of three trainings to take place this year.

  • Inquire for Pricing
  • One Off
  • Tools & Course Notes Included
  • Full bed & board & airport transfer
  • 10 Full Training Days
  • EU Ex-Armed & Special Forces personnel will automatically get a 50% discount for their service.


  • MAKE INQUIRY
Hunnic Cyber - Tooling

November 11th 2020 - 11 Spots

Final training to take place this year.

  • Flexible
  • One Off
  • Tools & Course Notes Included
  • Full bed & board & airport transfer
  • 10 Full Training Days
  • EU Ex-Armed & Special Forces personnel will automatically get a 50% discount for their service.


  • MAKE INQUIRY

Community

Giveback





As part of the work that Hunnic Cyber does in Hungary and around the world, we are enourmously grateful to the people that have allowed us to focus on this kind of work.

We do not forget that every corporate office we have worked in - there are cleaners, security guards, cooks, and a host of other extremely important elements of governments and corporations that do not receive recognition, and perhaps did not have opportunities to come through the front door with further education certifications in hand.

Perhaps the most stigmatised communities around the world are those who are mentally ill, and in Hungary the Roma/Cigany population.

Therefore for every single place purchased by a corporate, government or individual from a high income country, they will be paired with a local Hungarian chosen from the community dealing with any of the following issues -

Serious Mental Illness
Orphans
Recovering Drug, Alcohol, or Gambling absusers
The Roma community in Hungary (50% of total intake)
Homeless
Single Mothers
Financially challenged
Victim of Domestic or Emotional Abuse

All community placement candidates for all three intakes will be provided with the same facilities, and also all necessary computing equipment likewise, to keep at the conclusion of the training alongside career guidance. Where computer science knowledge is lacking, our Principal Consultant will work with the trainee in advance of the training to necessary the foundations.

While Hunnic Cyber is actively speaking with a number of candidates in the communities listed above already, if you are Hungarian and would like to put forward someone in your community that may like, or could benefit from this training please reach out to tom.kallo@hunniccyber.com

As is customary in these kinds of trainings, a CTF (Capture the Flag) will be held, with mixed teams of both paying customers, and community feedback placeholders to foster collaboration and knowledge transfer.

Course

Trainers

Hunnic Cyber - Offensive Security Tools

Tom Kallo

Tom has worked on a broad range of cyber security exercises for governments and affiliated Oil & Gas entities in the UAE, the FS sector in the UK and Luxembourg, the TMT, FMCG and Chemical Sectors in the UK, has taken part in regulatory driven CBEST & TBEST engagements in the UK and took part in a six month complex Advanced Intrusion Test against a leading UK bank.

He is OSCP certified, has completed Sensepost’s BlackOps Master Training alongside The US Department of Homeland Security’s Industrial Cyber Security Training. He has also achieved the Practical Threat Hunting certificate by Applied Network Defense, and is a Professional Member of the British Computer Society.

He has spoken as a plenary speaker at the Luxembourg Cyber Security Summit, has delivered training seminars at GCHQ accredited Information Security programmes at Royal Holloway and Greenwich Universities around Red Teaming in London, and has delivered a private training in Budapest for the largest West African cyber security consultancy.

Tom is has developed SharpSniper, SharpDomainSpray, Fene, and co-developed SharpML, developed a PoC for acheiving RCE using an XSLT injection in Ektron CMS among other internal tools, including SharpHungarian with his dog :)

References available on Linkedin:

"

Guest & Single Day Trainers


Hunnic Cyber works with highly experienced testers, programmers, architects, defenders and responders.

Throughout your training at Hunnic Cyber, these partners will be present to deliver guest presentations alongside assistance with developing training materials, and providing expert tuition.

They will also be on hand to deliver their own in depth trainings later this year around cyber defence, threat hunting and incident response in ICS/SCADA and corporate IT environments.

Training

Partners



Hunnic Cyber works with elite UK and Hungarian freelance trainers and training companies to deliver you world class tuition. Some of these partners are list below.

def


Peter Zsiros

Freelance



Gabor Szabo

Averisk Information Security



Timur 'x' Khrotko

DefDevEu

Training

Paperwork

Given that Hungary mandates a 14 day quarantine for new arrivals (subject to change), Hunnic Cyber will arrange a pick up from airport for all confirmed & paid for trainees, and provide housing during the training. The housing will provide a bedroom, bathroom, kitchen facilities, swimming pool, and an outside space alongside food that is prepared throughout the two weeks.

With COVID-19 under management in Hungary, and all public services resumed, international travel advisories do not prevent European nationals from entering - the UK's foreign office travel advisory is linked below.

Our accountants and legal representatives will also make contact once a place is purchased to co-ordinate timings and assist with mandatory Hungarian paperwork prior to entry, and all necessary support before and after arrival here.



UK Advisory



Magyar Advisory

Course

FAQ

Answer: Please think carefully before purchasing the course. We do not offer any refunds.
Unfortunately for our trainings we use multiple training staff in specialist areas and therefore we have our own costs to manage.
Given that we have limited places on the course, they are a first come first served basis.