DEF CON Training
Jayson E. Street - Simulated Adversary - Tactics & Tools Training $2,400
Name of training:
Simulated Adversary - Tactics & Tools Training
Jayson E. Street referred to in the past as:
A "notorious hacker" by FOX25 Boston, "World Class Hacker" by National
Geographic Breakthrough Series and described as a "paunchy hacker" by
Rolling Stone Magazine. He however prefers if people refer to him simply as
a Hacker, Helper & Human.
The Chief Chaos Officer of Truesec a global cybersecurity solutions
provider. The author of the "Dissecting the hack: Series" (which is
currently required reading at 5 colleges in 3 countries that he knows of).
Also the DEF CON Groups Global Ambassador. He's spoken at DEF CON, DEF CON
China, GRRCon, SAINTCON & at several other CONs & colleges on a variety of
Information Security subjects. He was also a guest lecturer for the Beijing
Institute of Technology for 10 years.
He loves to explore the world & networks as much as he can. He has
successfully robbed banks, hotels, government facilities, Biochemical
companies, etc.. on five continents (Only successfully robbing the wrong
bank in Lebanon once all others he was supposed to)!
*He is a highly carbonated speaker who has partaken of Pizza from Bulgaria
to Brazil & China to The Canary Islands. He does not expect anybody to still
be reading this far but if they are please note he was proud to be chosen as
one of Time's persons of the year for 2006.
Trainer social media links:
Websites: JaysonEStreet.com & HackerAdventures.World
This class covers all aspects of an engagement, starting with online
research in a quick and efficient manner. Attendees will learn how
adversaries can attack in non-traditional ways. Jayson's style focuses on
education over compromise by helping show how to move past finding
vulnerabilities into educating and improving the security of the target. The
emphasis for this class will be hands-on, real-world examples and
demonstrations that help companies understand the human side of social
Traditional pentest focuses on exposing vulnerabilities and showing how they
can be exploited. A Red Team engagement does a more in-depth simulation of
an advanced targeted attack with once again focusing on not just discovering
potential weaknesses in the target's defenses but giving proof of concepts
showing they can be exploited. Jayson has created the Security Awareness
Engagement methodology for a way to show real world threats without actually
compromising or exploiting discovered vulnerabilities in a way that might
negatively impact the company. Instead simulations use non-intrusive
demonstrations that work in tandem with direct and immediate education of
Through the use of hands-on, real-world examples and demonstrations. This
class will go beyond Metasploit, popping shells and zero day exploits,
focusing on the most considerable threat a company faces, the human factor.
This class is not just for pentesters but also for security teams who want
to educate their employees. Class activities will introduce students to real
world simulations of how Social Engineering and Physical Compromise attacks
occur. Students will also participate in simulations where they use the
results from their labs to execute the attack, an attack with Jayson playing
the roles of the target to compromise.
Who am I
Who are we
Current State of security awareness
What is Social Engineering
Red Teaming or Physical Pentest
The human factor
Module 2 Recon
Recon in real life
Lab: Conducting your own recon
Module 3 Phishing
Phishing for results
Finding emotional trigger
Lab: Constructing a phish using results from Module
Module 4: Importance of preparedness
Preparing for onsite engagement
Clarifying scope of work
Managing client expectations
Get out of jail free card
Lab: 'Creating' a "Get out of jail free" card
Module 5 Weapons of Mass Education & Learning to code in Ducky script
An overview of the tools such as Bash Bunny, Pineapple, OMG cables & rubber
ducky, Flipper Zero & other useful devices.
Purpose of these tools
Each student will be given a book on programming in Ducky script.
We will go over several chapters that I will teach from. This will give
students the understanding and ability to write their own beginner payloads
for the Rubber Ducky.
Lab: Configuring the Rubber Ducky
Module 6 Infiltration of the Location
Commitment to your persona
Time of attack
Lab: Creating your persona for your scenario
Module 7 Execution Phase
Lab: Setting the stage and acting it out
Module 8 What's next?
Dealing with compromised humans
Educating on the spot
Conveying the lessons to management
Covering the findings in a positive way
Lab 7: Consoling and educating the compromised
Technical difficulty of the class (Beginner, Intermediate, Advanced) and any
required experience or skills needed (Such as Python, knowledge of specific
deep-learning algorithms, TCP dump analysis, Ghidra, etc.)
This class is created to be easy enough for a beginner to learn & keep up
with the training. Yet also engaging & technically novel enough that
intermediate & advanced students will stay engaged and learn new techniques
and different approaches to these skill sets.
Suggested prerequisites for the class:
There are no prerequisites for the class.
Items students will need to provide:
A laptop and a desire to learn! A Hak5 Rubber Ducky will be provided for all
DATE: August 14th-15th 2023
TIME: 8am to 5pm PDT
VENUE: Caesars Forum, Las Vegas, NV
TRAINER: Jayson E. Street
- 16 hours of training with a certificate of completion.
- Note: Classes that do not meet their minimum class size by July 15 will be canceled, please register early
- 2 coffee breaks are provided per day
- Note: Food is not included
Registration terms and conditions:
Trainings are refundable before July 1st, the processing fee is $250.
Trainings are non-refundable after July 10th, 2023.
Training tickets may be transferred. Please email us for specifics.
Failure to attend the Training without prior written notification, will be considered a No-Show. No refund will be given.
By purchasing this ticket you agree to abide by the DCT Code of Conduct and the registration terms and conditions listed above.