c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...
This intensive 3-day workshop takes participants on a deep dive into the full phishing attack chain, from initial reconnaissance all the way through post-exploitation, detection evasion, and incident response. Building on the previous edition delivered at c0c0n 2024, this edition expands the curriculum with a dedicated third day focused on detection, defensive strategies, and incident response, while also touching on emerging attack trends.
Participants will gain hands-on experience operating real phishing toolkits and frameworks used in modern red team engagements. They will learn how to craft convincing spear-phishing campaigns, bypass multi-factor authentication using Adversary-in-the-Middle (AitM) proxies, and move laterally within an environment after a successful credential harvest. The workshop also covers how modern cloud services and identity providers fit into the phishing picture, giving participants enough context to understand the risks without requiring cloud lab access.
The workshop bridges the gap between theory and practice: every topic is paired with lab exercises, live tool demonstrations, and a final CTF challenge that simulates a full-chain phishing engagement. By the end, participants will understand both how attackers operate and how defenders can detect and disrupt each stage of the attack.
The workshop also touches on how AI and LLM tools are increasingly shaping both attack and defence. Rather than deep technical dives, the focus is on awareness: understanding what is changing in the threat landscape and what that means for detection and security awareness programmes.
Basic understanding of how email and web protocols work. Comfort with the Linux command line. No prior red team or penetration testing experience required, though it helps.
A pre-configured lab VM will be shared with registered participants ahead of the workshop. Attendees are expected to have it downloaded and running before day one.
3 days
Principal Security Researcher, Malwarebytes