Blog Post

The Human Connection Blog
2 MIN READ

New Labs: BlackHat 2025 and DefCon 33

benhopkins's avatar
benhopkins
Icon for Immerser rankImmerser
2 days ago

Today, Immersive's Container 7 team has released a number of new labs into the BlackHat/DefCon collection comprising labs covering some of the most interesting and insightful topics from the BlackHat 2025 and DefCon 33 conferences.

Throughout early August 2025, representatives from Immersive's cyber team attended the BlackHat 2025 and DefCon 33 conferences and got great exposure to the latest technologies, topics, and techniques presented by the sharpest minds in our industry. As a result of attending these talks, workshops, and villages, Immersive has created brand new labs going through the various talks that took place, allowing you to get hands-on with the latest technologies and exploits. We present a number of brand new labs covering some of the most interesting and insightful topics from the events, from operational technology (OT) to achieving privilege escalation through firewall software.

AI was a hot topic, as you would imagine, especially around Prompt Injection attacks. We already have plenty of content on Prompt Injection, not to mention the new AI Foundations content, so for this series, we created an Appsec Style lab around preventing Prompt Injection attacks.

Why should our customers care?

BlackHat and DefCon are two conferences that attract the greatest minds in cyber to get together and share their knowledge through workshops, official talks, and villages. Given the high diversity of events and talks that took place, there is something for everyone! Many of the topic areas shared are things that attackers could easily exploit themselves, so taking advantage of the information in these labs equips our customers with the knowledge of the latest vulnerabilities, threats, and exploitation techniques currently being talked about in the industry - improving your resilience and preparation against the latest threats.

Who are the labs for?

  • Offensive Security Engineers and Penetration Testers
  • SOC Analysts and Incident Responders
  • Malware Reverse Engineers
  • Operational Technology Engineers
  • Cyber Security Engineers

Here is a list of the labs in this release:

  • Binary Facades: Extracting Embedded Scripts
  • CVE-2024-5921 Redux - Bypassing mitigations to PrivEsc with Palo Alto Global Protect
  • Chrome Alone: Transforming a Browser into a C2 Platform
  • No VPN Needed?: Cryptographic Attacks Against the OPC UA Protocol
  • Python: AI Prompt Injection

If you'd like to do any of these labs, here is a link to the BlackHat/DefCon collection:

Updated 2 days ago
Version 1.0
No CommentsBe the first to comment