Event Details

Instructor-Led Courses (online, in-person)

Loading Events

« All Events

  • This event has passed.

Mobile Security Toolkit – Ethical Hacking Workshop – HackNYC – New York City, NY

May 9 @ 8:30 am - May 10 @ 4:30 pm EDT

To register for this event, click Buy Now,
if you are interested but still have questions, click Contact Us.

Days – 2

Who Should Attend?

IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers

What is the Mobile Security Tool Kit?

EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device.

EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.

INCLUDES:

  • keyboard
  • carry case
  • STORM T-shirt
  • STORM Sticker
  • Access to the STORM Resource Center (Video Demos, Support, ISO Image Download)

What is the Mobile Security Tool Kit Workshop?

In this course, you will learn the procedures to use a virtual bridge and connect to a physical network.  How to run virtual software and bridge it to your Storm device as well as how to isolate the Storm with the bridge. Configure secure remote access, and connect from the Internet and do your assessments from your backyard with no airport security checks! You will learn methods of protocol analysis to identify intrusions. How to identify weaknesses and vectors of attack for both wired and wireless networks using the device. The hacking and penetration testing methodology will be conducted using the device as the main attack platform to gain access to the network and machines that you have targeted. In the course, you will perform against a  set of targets using the device and knowledge learned from the course

Course includes:

  • e-Book
  • Certificate of Attendance (.pdf)
  • STORM device
  • keyboard
  • carry case
  • STORM T-shirt
  • STORM Sticker

What Students should bring:

  • Laptop (Micro SD card Reader a plus)
  • Enthusiasm for Learning knowledge of Linux a major plus!

Introducing the STORM!

Mobile Security Toolkit Workshop

Here is what some of our STORM class students had to say:

“I really enjoyed the class, thanks for working with the chapter to get this delivered to the group. Hope we can do something similar next year.” – Anne-Marie Colombo, SAP

“It was a smashing success. In January we should have you talk to the ISSA Board and see how we do more.” – Justin Orcutt, NCC Group

“Everyone enjoyed what EC-Council brought to BSides Huntsville! The STORM Device is so cool and we have attracted a new audience because of EC-Council” – Cary Pool, NAISSA President

“I’ve taken all of EC-Council Courses at TakeDownCon. This was a nice addition to BSides and it was great to sit in a new EC-Council Class and learn a new device!” – Chad Holton, State of AL Alcoholic Beverage Control Board

“It was my first time working with EC-Council and It was great to bring a workshop from such a reputable certification body, this added tremendous value to BSides Tampa and I look forward to working with you all again in 2019!”- Derek Thomas, BSides Tampa Organizer

Mobile Security Toolkit – Ethical Hacking Workshop

Hack NYC focuses on preparation for and resilience to, the genuine potential for Kinetic Cyber attack. So if you are just getting started, trying to level up or are already a mad scientist of Cyber Security looking for the next project, go ahead and grab your ticket, their is a hard limit and once they are gone there will be no more. Keep an eye on the site and your email after you grab a ticket, we will be updating the agenda, and you don’t want to miss out on any special offerings we will post up here 1st.

Tuition includes admission to HACKNYC all sessions on May 8th!


Module 01

Module 01: Technical Introduction to the Storm

  • Hardware Assembly and Chipsets
  • Imaging Techniques
  • Linux ARM Distro options
  • Management of Modules and Meta Packages
  • Industry tips and best practices
  • LAB: Backing up and restoring the Storm image



Module 02

Module 02: Network Traffic Monitoring and Analysis

  • Network Traffic Monitoring and Analysis(Introduction)
  • Advantages of Network Traffic Monitoring and Analysis
  • Network Monitoring and Analysis: Techniques
  • SNMP Monitoring
  • Network Traffic Signatures (normal and attack)
  • Categories of Suspicious Traffic Signatures
  • Attack Signature Analysis Techniques
  • LAB: Using the Storm device for network traffic monitoring and analysis



Module 03

Module 03 Hacking Concepts, Types, and Phases

  • What is Hacking
  • Who is a hacker?
  • Hacker Classes
  • Hacking Phases
  • Ethical Hacking Concepts and Scope
  • Skills of an Ethical Hacker
  • The Hacking Methodology
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • LAB: Using the Storm Device to perform the hacking methodology and penetration testing



Module 04

Module 04: Exploring the Hacking Methodology

  • Footprinting Concepts
  • What is Footprinting
  • Objectives of Footprinting
  • Footprinting methods
  • Overview of Scanning
  • Abstract Scanning Methodology
  • Live Systems
  • Ports
  • Services
  • Enumeration
  • Identify Vulnerabilities
  • Exploit
  • Introduction to System Hacking
  • Cracking passwords
  • Privilege escalation
  • Rootkits
  • LAB: Gaining and maintaining access using your Storm device



Module 05

Module 05: Hacking Concepts, Types, and Phases

  • What is Hacking
  • Who is a hacker?
  • Hacker Classes
  • Hacking Phases
  • Ethical Hacking Concepts and Scope
  • Skills of an Ethical Hacker
  • The Hacking Methodology
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Using the Storm Device to perform the hacking methodology and penetration testing



Module 06

Module 06: Exploring the Hacking Methodology

  • Footprinting Concepts
  • What is Footprinting
  • Objectives of Footprinting
  • Footprinting methods
  • Overview of Scanning
  • Abstract Scanning Methodology
    • Live Systems
    • Ports
    • Services
    • Enumeration
    • Identify Vulnerabilities
    • Exploit
  • Introduction to System Hacking
    • Cracking passwords
    • Privilege escalation
    • Rootkits
  • Gaining and maintaining access using your Storm device

 



Module 07

Module 07: Wireless Network Threats and Attacks

  • Wireless Network Threats
  • Wireless Hacking Methodology
  • Wireless Traffic Analysis
  • Launch Wireless Attacks
  • Crack Wi-Fi Encryption
  • Wireless Hacking Tools on the Storm Device
  • Introduction to Tactical Wireless Attack Capabilities of the Storm Device



Kevin Cardwell

Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.

He spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.

He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK . He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences as well as many others. He has chaired the Cybercrime and Cyberdefense Summit in Oman and was Executive Chairman of the Oil and Gas Cyberdefense Summit. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments 2nd Edition and Backtrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. He serves as a professional training consultant to the Oman Information Technology Authority, and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, federal agencies, major banks and financial institutions throughout the globe. Some of his recent consulting projects include the Muscat Securities Market (MSM), Petroleum Development Oman and the Central Bank of Oman. He designed and implemented the custom security baseline for the existing Oman Airport Management Company (OAMC) airports and the two new airports opening in 2017. He created custom security baselines for all of the Microsoft Operating Systems, Cisco devices as well as applications. Additionally, he provides training and consultancy to the Oman CERT and the SOC team in monitoring and incident identification of intrusions and incidents within the Gulf region. He holds the CEH, ECSA, LPT and a number of other certifications.

Tool kit Specs

  • 64 Bit – Quad Core Mobile System with Case
  • 1 GB RAM
  • 7 inch touch screen display
  • 64 GB MicroSD – Preloaded w/Custom Linux Hacking OS
  • 100Mb Ethernet port
  • 4 USB ports
  • 802.11n wireless
  • Bluetooth 4.1
  • Combined 3.5mm audio jack and composite video
  • Camera interface (CSI)
  • Display interface (DSI)
  • VideoCore IV 3D graphics core
  • Full HDMI
  • USB 2.0 A to B Micro Power Cable. [The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.]
  • Rollup water resistant keyboard
  • Field Case Organizer for all your gear

Interested but still have questions?

Details

Start:
May 9 @ 8:30 am
End:
May 10 @ 4:30 pm
Event Category:

Venue

Hotel Pennsylvania
401 7th Ave
New York, NY 10001 United States
+ Google Map