Tickets are free and reserved for woman/x only.
Ticket includes lunch and a ticket to the Conference the next day is included upon registration:
https://docs.google.com/forms/d/e/1FAIpQLSe7gmOsIjW5SuX7Dy8JpQ5NHMlcVIJeKuEniDDpXei5P3Uziw/viewform
9:00 - 17:00
In this class, you will learn the fundamentals of reverse engineering and binary exploitation on Intel x86-64 systems. You will explore how compiled programs work at a low level, how to analyze ELF binaries using command-line tools and disassemblers, and how to identify simple vulnerabilities in real code.
This workshop introduces the fundamentals of reverse engineering Intel x86-64 binaries and exploiting a simple buffer overflow vulnerability to achieve code execution on a vulnerable server. Such exercises, commonly referred to as pwn challenges, provide a practical entry point into binary exploitation and offer valuable insight into the behavior of low-level programs.
Participants will examine how compiled binaries can be analyzed through disassembly and decompilation into assembly and pseudo-C code. The workshop will also cover common binary protection mechanisms that increase the difficulty of exploiting buffer overflow vulnerabilities. In addition, attendees will learn about the ELF binary format, techniques for analyzing ELF files, and the use of command-line tools to extract relevant information. Disassemblers and decompilers will be used throughout the session to assist in identifying and understanding vulnerabilities.
Basic programming experience in C and Python.
Familiarity with the Linux command line (navigating directories, running commands, editing files).
A laptop with Docker installed.
This is a beginner friendly course, affinity with programming is recommended.
This training is exclusively made available for women (by women).
Paula M. (pamoutaf) has a background in penetration testing and, as part of a career switch, she has been developing expertise in reverse engineering and binary exploitation. She has attended BlackHoodie trainings in the past and also recently given a training at Hexacon 2025. Linkedin: https://www.linkedin.com/in/pamoutaf/
This training is made possible by BlackHoodie and CybHerStrong.
More Info: https://blackhoodie.re/BSidesLimburg2026/
Tickets costs €100,00
Ticket includes lunch and a ticket to the Conference the next day is included upon registration:
https://my.weezevent.com/bsides-limburg-training-spectreops
9:00 - 17:00
Become a Bloodhound Operator, instructed by the creators of Bloodhound.
You hear some of the Red teamers talk about Attack Paths, OpenGraph, and Cypher queries but you are not sure what it’s all about? No worries, we’ve got you covered. We’ll take you from new BloodHound user to power-level-over-9000-BloodHound-Ninja.
During this workshop, we start from the basics and guide you from setup all the way to becoming a capable, hands-on BloodHound operator.
Basic Active Directory and InfoSec knowledge is required.
A laptop that is capable of running BloodHound Community Edition, as this is a hands-on workshop.
This workshop is aimed at new to intermediate BloodHound users.
This workshop is made possible by SpecterOps.