Students will be handed in a VMware image with a specially prepared testing environment to play with the bugs.
What’s more, this environment is self-contained and when the training is over, students can take it home (after signing a non-disclosure agreement) to hack again at their own pace.
To get the most of this training intermediate knowledge of web application security is needed. Students should be familiar with common web application vulnerabilities and have experience in using a proxy, such as Burp Suite Proxy, or similar, to analyze or modify the traffic.
Hardware - Software Requirements
a laptop with 64-bit operating system
at least 4 GB RAM (8 GB preferred)
35 GB free hard drive space
USB port (2.0 or 3.0)
wireless network adapter
ability to turn off AV
firewall and VMware Player
Fusion installed (64-bit version).