COURSE IS SELF-PACED, AVAILABLE ON DEMAND

DURATION: 12 hours

CPE POINTS: On completion you get a certificate granting you 12 CPE points. 

The course starts on the 8th of February 2023.

Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.


Who is this course for?

This course is for any hacker or security professional regardless of industry experience and job title. Maybe this is the key to unlocking a new position within your organization or advancing an already established skill-set. The more practical experience we are exposed to, the greater our skills as a security professional become. Even if you don’t know anything about, or are new to, Smart contracts, programming, hacking and Blockchain, this course will give you a great foundation to start your journey into the world of Blockchain.

Why take it NOW?

The best time is always NOW! If not now, then when? Our industry is changing due to technological advances and persistent threats, but the approaches towards security remain the same. Right now, you can start to change the trajectory of our industry and shape a future of innovation for years to come, and it all starts with a single step towards progress. Ask yourself, why not me? Right now is the best time to learn a new skill and let your imagination change the course of our industry towards sustainable success for generations to come. Blockchain puts into motion a powerful pendulum that is getting heavier with possibilities with each swing.

Why this course?

The world is driven by APIs and the landscape of cybersecurity is changing at an extremely fast pace. Professionals are seeking to find a new edge, not only for themselves but for their clients' protection as well. This course will introduce you to blockchain APIs, tools we can use to compromise the API and gather more information that can be used in exploitation. 


Course benefits:

What skills will you gain?​​ ​​​ ​​ ​ ​​​​​

  • Learn to use new tools and methods to scrutinize blockchain based APIs.
  • Learn API analysis for tracking API transactions.
  • Learn to compromise blockchain based API from a different angle. 

What will you learn about?

  • What is a Blockchain API?
  • Current implementation roles in technology.
  • POSTMAN – installation and setup.
  • Compromising blockchain APIs.
  • Learn to utilize blockchain API for analysis.

What tools will you use?

  • Kali Linux or Ubuntu
  • POSTMAN
  • Coinpath
  • ContractFuzzer

Course general information: 

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text

What will you need?

  • Desktop/Laptop Computer
  • OS (Linux/Windows/Mac)

What should you know before you join?

  • Basic understanding and usage of Linux.

A demo will be available when the course starts.


YOUR INSTRUCTOR:  Atlas Stark

Atlas Stark is a security researcher at Stark Industries Inc. with 16+ years in the technology industry. Currently providing cyber security solutions and OSINT services to anti-human trafficking non-profits that aid in the investigation and victim recovery. He also consults with state-level law enforcement agencies concerning hacking-related incidents. He splits his time between California and Tennessee.


COURSE SYLLABUS


Module 0

Before the course

An introductory module.

  • Basic system and Environment setup
  • Kali Linux, Ubuntu bare metal or VM

Module 1

Getting started

When approaching Blockchain technologies, it’s always a great idea to organize your workspace in a manner that promotes a positive learning environment. Efficiency is key when establishing your space, just keep the ‘less is more’ mindset when designing your area.  Within this module, we will be discussing the installation steps for all of our tools and environments we will be using for this course.

  • Postman installation and setup
  • Coinpath setup
  • Contract Fuzzer installation and setup
  • Test case APIs we will use throughout this course
  • Exercise explanation

Practical graded assignments:

  • Installation and setup of tools in the environment of choice.
  • Provide screenshots of successful installation and setup.
  • Provide screenshots of the implemented test case APIs provided by the instructor.

Module 2

API analysis

In this module, we will be analyzing our test case APIs with Coinpath and Contract Fuzzer to discover potential vulnerabilities.

  • Identify vulnerabilities within the test case API.
  • Scrutinize output and classify the potential vulnerabilities.
  • Exercise explanation.

Practical graded assignments:

  • Provide screenshots of output from tools covered in the module.
  • Provide code snippets of potential vulnerabilities.

Module 3

Exploiting vulnerabilities found

In this module, we will be exploiting the information we have gathered in a variety of ways with a varied set of tools. We will explore some, but not all, of the potential impact these vulnerabilities can have in regards to the API.

  • Exploiting information gathered from test API.
  • Impact of vulnerabilities.
  • Explore impact to blockchain API driven supply chain.
  • Exercise explanation.

Practical graded assignments:

  • Proof of work in the form of screenshots of discovered vulnerabilities.
  • Proof of work that displays terminal output.

Module 4

Wrap up and next steps

In this module, we will be discussing how this newly gained knowledge can translate into making you a better security professional. Whether you are part of a Red Team or a lone pentester, being able to compromise blockchain-based APIs is a great skill set to enhance your abilities.

Discuss new technologies to look for in the future in regards to blockchain API/OS and how they could be implemented and exploited.

Practical graded assignments:

Provide screenshots and a quick synopsis of the technology as well as a way to exploit the tech.


Final exam

Comprehensive exam covering overall methods and functionality of framework. Matching outputs to the corresponding tools. T/F questions on modules and libraries.

Quiz: 25 questions


QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.