[DEV][MAGAZINE][FORUM][BUG BOUNTY]
Account [Registration]   Lab Role [Anonymous] Researcher: 513 Advisories: 658 Documents: 29 Videos: 110 Date: 01.08.2014 TZ: 15:53

[ Home ] [ Upcoming ] [ Web-Application ] [ Vendor ] [ Remote ] [ Local ] [ Mobile ] [ Websites ] [ Documents ] [ Videos ] [ ?! ]

Commercial Talks - Event Speakers, PenTest Shows or Workshops

Vulnerability-Lab provides stable commercial talks which are getting extended in a period of every quartal per year to make them unique and perfect. This talks are very informativ for researchers, security companies or penetration tester to learn about manually exploitation, protection, bypass technics, secure programming & more ...

Our company does not only offers workshops and presentations, it does as well live shows for hacking events and conferences. As in other subject areas, the emphasis here is on IT security. To get an overview on the various training courses, workshops and to give live shows, we have extra hacking compiled for you the following information. All our training courses, lectures and performances require no previous IT knowledge. Only if a workshop or a presentation with advanced or expert is instantly highlighted in the title, we require a technical knowledge for your understanding. The training courses and workshops take an average of 1-2 day (s) to complete and include short breaks. The live shows of Hacking take between 30-60 minutes and 60-120 minutes between our presentations, those are ideal for conferences or training sessions.

TEXT & CONTENT UPDATE! 24h


[ Workshops ]

We provide excellent & exclusive workshops around topics like phone/mobile security, 0day software & application bugs, firewall & filter pentests. Check them out and book 1 or 2 sessions for your company, event or prv8 team. Enjoy the live Workshops by our official & well known Laboratory experts.

120 - 240 MinutesSQL Injection Exploitation - Beginners Guide and Exploitation Training No.1Shadab Siddiqui
120 - 240 MinutesSQL Injection Exploitation - Advanced Guide and Exploitation Training No.2Chokri Ben Achor
120 - 240 MinutesCross Site Scripting Attacks - Beginners Guide and Exploitation Training No.1Shadab Siddiqui
120 - 240 MinutesCross Site Scripting Attacks - Advanced Guide and Exploitation Training No.2Benjamin Kunz Mejri
120 - 240 MinutesCross Site Request Forgery - Beginners Guide and Exploitation Training No.1Chokri Ben Achor
120 - 240 MinutesCross Site Request Forgery - Advanced Guide and Exploitation Training No.2Ibrahim El-Sayed
120 - 240 MinutesWireless Hacking - Beginners Guide and exploitation Training No.1Ibrahim El-Sayed
120 - 240 MinutesCode Breakers - Beginners Guide breaking Encryptions or Algorythms No.1Benjamin Kunz Mejri
120 - 240 MinutesCode Breakers - Advanced Guide breaking Encryptions or Algorythms No.2Darius Müller
120 - 240 MinutesSmartphones - Beginners Guide Vulnerabilities & Misconfiguration No.1Shadab Siddiqui
120 - 240 MinutesSmartphones - Advanced Guide Vulnerabilities, Surveillance and Hacking No.2Darius Müller
120 - 240 MinutesReverse Engeneering - Beginners Guide with Hardware & Software No.1Darius Müller
120 - 240 MinutesReverse Engeneering - Advanced Guide with Hardware & Software No.2Darius Müller
120 - 240 MinutesMalware Analysis - Beginners Guide with Reviews, Analysis & Training No.1Ibrahim El-Sayed
120 - 240 MinutesMalware Analysis - Advanced Guide with Reviews, Analysis & Training No.2Ibrahim El-Sayed
120 - 240 MinutesForensics - Beginners Guide with Reviews, Analysis & Training No.1Sven Hermers
120 - 240 MinutesForensics - Advanced Guide with Reviews, Analysis & Training No.2Sven Hermers

[ Presentation ]

60 - 120 MinutesSkype Software Vulnerabilities - Advanced 0 Day Exploitation 2011/2012Benjamin Kunz Mejri
60 - 120 MinutesUTM, Filter or Web Firewalls - 0Day Bugs, Exploitation and Filter Bypass TechnicsBenjamin Kunz Mejri
60 - 120 MinutesBanking Nightmares 2012 - Softare, Service, Application and ATM VulnerabilitiesChokri Ben Achor
60 - 120 MinutesCounter Terrorism 2012 - How they move, hide and how they earn moneyBenjamin Kunz Mejri
60 - 120 MinutesCyberwar 2011/2012 - Military, Activists, Criminals & Exploit DatabasesChokir Ben Achor

[ Live Hacking ]

We provide excellent & exclusive live hacking sessions around topics like validation, 0day bugs, exception problems & filter pentests. Check them out and book 1 or 2 sessions for your company or computer/security event. Enjoy the live sessions & video reviews.

30 - 60 MinutesCross Site Scripting - Services, Applications & SoftwareIbrahim El-Sayed
30 - 60 MinutesSQL Injections - Content Management Systems, Website and ServicesChokri Ben Achor
30 - 60 MinutesCross Site Request Forgery - Exploitation, Pictures and Video ReviewIbrahim El-Sayed
30 - 60 MinutesMan in the Middle - Sniffing or Redirection of Network Traffic (MITM)Ivan Montilla Miralles
30 - 60 MinutesBuffer Overflows - Identification, Analysis & ExploitationBenjamin Kunz Mejri
30 - 60 MinutesUTM, Web Filter or Web Firewall - Exploitation via Validation and Filter BypassBenjamin Kunz Mejri
30 - 60 MinutesHacking Mobile Phones - Applications, Jailbreaks & Core VulnerabilitiesShadab Siddiqui
30 - 60 MinutesBrowser Exploits - XSS, Filter Bypass and Remote Code ExecutionsBenjamin Kunz Mejri

[ Book Reviews ]

60 MinutesNetzKinder gegen Offliner - Review, Discussion, Pictures and BackgroundsAlexander Fuchs


Copyrights & Trademarks

All pictures, texts, advisories, sourcecode, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list(feed/auto), modify, use or edit our material contact the administrator of the vlab to get a easy ask permission ... admin[at]vulnerability-lab.com

[ Search ] [ News ] [ Submit ] [ Stats ] [ Team ] [ Partner ] [ Talks & Workshop ] [ Subscribe ] [ Customer ] [ Contact ] [ Impressum ]


[UPCOMINGS] [August]: 1 Critical: 0 High: 1 Medium: 0 Low: 0 Best Researcher [Ateek Khan] Productivity: