Ruben Gonzalez - Hacking Cryptography: Attacks, Tools and Techniques $2,300 June 2025
DESCRIPTION: Crypto related bugs are super common. OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, let's face it: Nobody knows how cryptography works. Using case studies from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.
This course turns you into a powerful weapon. You will know how applied cryptography works, how it's commonly misused in the field and how this leads to exploitable bugs. That means, by the end of the course you will be among the very selected group of people that can identify, avoid and exploit vulnerabilities in code using crypto.
No prior knowledge required!
THINGS YOU’LL LEARN:
• understand how modern cryptography works.
• find common crypto vulnerabilities in real software.
• write crypto exploits for real software (and an IoT device).
• Learn how modern cryptography operates. Learn what kind of guarantees are given by certain primitives, and which aren't.
• Understand how crypto primitives are combined into protocols.
• Learn how cryptography is often misused in practice and how this misuse can be exploited.
• Write exploits for systems using cryptography in an inappropriate way.
• Evaluate program code that uses cryptography for proper usage.
• Identify cryptographic schemes and potential vulnerabilities in black-box tests.
TECHNICAL DIFFICULTY: BEGINNER TO INTERMEDIATE
STUDENT REQUIREMENTS: This is a beginner to intermediate course. Students should be familiar with at least one scripting language and have a basic understanding of computer networks. The contents are compressed, but no prior knowledge of cryptography is needed. Every subject is introduced before attacks are presented.
WHAT SHOULD STUDENTS BRING: A laptop to join the virtual learning environment.
TRAINER BIO: - Ruben Gonzalez (Lead Trainer)
- 10 years in offensive security research
- Security Researcher and Trainer at Neodyme
- Auditor of crypto code for multiple large industry projects
- Part-time PhD candidate for applied cryptography at the Max Planck Institute
- Multi-time DEFCON CTF, Hack-A-Sat, HITB ProCTF and Google CTF finalist
- Founder and Chair of the RedRocket Hacking Club
- 16 hours of training with a Certificate of Completion
- Boxed lunch
- 2 coffee breaks per day & snack
Registration terms and conditions:
Trainings are refundable before May 5th, 2025 the processing fee is $250.
Trainings are non-refundable after May 16th, 2025.
Training tickets may be transferred. Please email us for specifics.
Failure to attend the Training without prior written notification, will be considered a No-Show. No refund will be given.
By purchasing this ticket you agree to abide by the DCT Code of Conduct and the registration terms and conditions listed above.