Where are the trainings take place?
- Unlike the RootedCON Congress, the trainings are held at the Eurostarts i-Hotel:
- Hotel Eurostars I-Hotel
- Virgilio 4
- Ciudad de la Imagen 28224
- Pozuelo de Alarcón, Madrid, Spain
What is the difference between BootCamp and RootedLab?
- We differentiate the training by hours of training. A RootedLab has 8 hours of training, while a BootCamp has about 24 hours.
How can I register?
- For registration, go directly to the RootedManager. There, once registered you can select the training and pay directly. Once the training is given, you can request the invoice by following the steps indicated.
Can I pay with bank transfer?
- Yes, from the RootedManager itself you can manage the payment by bank transfer.
Does the training include food?
- The training does not include food. But there are several options in the area, and the staff will give you more information.
[R25BC01] OSINT Essentials
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
Learn about Open Source Intelligence and how to apply it to investigations of individuals, companies, products, etc. Learn how, when, and where to search for information on social media. Investigate the Dark Web as a professional: Safely and efficiently. Use both manual and automated techniques for information extraction.
[R25BC02] Red Team Operations 2025
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
The objective of the Bootcamp is to equip attendees with the skills to develop intrusion exercises and real attack simulations, understanding the process, phases, and actions, as well as the techniques, tools, and guidelines for succeeding in any exercise, regardless of the target organization. During the 3-day training, students will work on all aspects of an intrusion, from deploying the necessary infrastructure and recognizing assets to internal actions such as lateral movement between systems, compromising infrastructure, and deploying a complete internal persistence network. The bootcamp has a clear goal of practically demonstrating a methodology and techniques useful for carrying out targeted attacks, which is why it will not delve into techniques beyond this scope. Students will be provided with a lab, both locally and in the Cloud, where they can simulate all the techniques learned..
[R25BC03] Hardware Hacking Bootcamp 2025
1600€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
Explore the Universe of Hardware with Linux: Discover how Linux can guide you through the fascinating world of hardware. Uncover the secrets and limitless possibilities that this combination can offer. Master the Fundamentals of IoT and Embedded Systems: Dive into the heart of IoT technology. Understand the key differences and unique applications of devices like Raspberry Pi, Arduino, and routers. Transform your curiosity into practical knowledge. Learn to create devices with an offensive approach, such as a WiFi Pineapple. Camouflaged devices for data filtration in organizations, discover the secrets of their development and apply that wisdom to your own projects. Master the skill of soldering using various tools like blowers, soldering irons, and microscopes. Immerse yourself in the inner workings of everyday and specialized devices such as thermostats, sensors, security alarms, portable medical devices, fitness bracelets, and robots. Understand their mechanics and apply it to innovate and create. THIS BOOTCAMP INCLUDES MATERIALS!!
[R25BC04] Active Directory Attacks (Ataques al Directorio Activo)
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
This workshop provides a comprehensive understanding of how to audit and exploit an Active Directory. Participants will learn how to identify insecure configurations, exploit known vulnerabilities, perform lateral movements, and apply advanced techniques to compromise and maintain persistence in AD. Additionally, the hands-on approach will allow attendees to develop their skills by testing in realistic simulated environments.
[R25BC05] Respuesta ante incidentes en Windows y O365
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
CEO scams. Data theft by disgruntled employees. Cyber espionage (industrial or state-sponsored). The current world is completely dependent on technology, and cybercriminals are fully aware of this. Given the increase in incidents, the need for skilled technical personnel to respond quickly and efficiently is becoming more crucial. The aim of the training is to equip participants with procedures, strategies, and tools so they can effectively respond to a security incident. With a strong practical focus, the course will cover the phases of incident response, indicating the best available tools for each case and how to make the most of them, as well as quick wins that help identify malicious activity as early as possible. The course will have a strong forensic component but will maintain an incident response orientation, offering a simulated incident, 15 practical exercises, and two CTFs (one for Windows and one for O365).
[R25BC06] Hacking Ético de Aplicaciones Móviles Android-iOS
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
Do you want to discover the most advanced ethical hacking techniques that will allow you to assess and strengthen the security of Android & iOS mobile applications, thus opening up new professional opportunities in the exciting field of mobile cybersecurity? If you answered 💥Yes, I do💥, we invite you to enroll in this Bootcamp, where we will explore the complexities and challenges of mobile application security, acquiring technical skills to identify vulnerabilities, assess risks, and strengthen security in the mobile environment. The training focuses on the practical aspects of Penetration Testing and Ethical Hacking for mobile applications, with the aim of learning, solidifying, and practicing the fundamentals of various mobile application audit techniques for both Android and iOS, while conducting these analyses using the renowned 'OWASP Mobile Security Testing Guide (MSTG)' methodology. Additionally, we will provide guidelines on how to present the results in a report, which is that crucial part of the professional world. Dive into hands-on practice (Hands-on Labs) by analyzing applications specifically designed for Android & iOS in an exciting virtual and emulated environment! 🚀😀 Oh, and to test your knowledge, at the end of the course, you will face a challenging CTF, where the winner will receive a mobile device as a prize! 🚀😀
[R25BC07] Cloud Pentesting (AWS, GCP, Azure) 2025
1250€ es + Info REGISTER
Bootcamp hours for each day: 09:00h - 20:00h
The training lasts 3 days, with each day dedicated to one of the largest clouds: AWS, GCP, and Azure. Each cloud will be introduced from scratch, teaching the basic principles of each platform. Once the foundation is established, we will discuss how to use and exploit the main services of each cloud. Participants will learn how to perform White Box penetration testing in each cloud, from the required permissions to the actions needed to find vulnerabilities and misconfigurations. The course will also cover how to conduct Black Box penetration testing (Red Team) in each cloud: unauthenticated enumeration, entry points, exploitation, etc. Concepts will be reinforced through CTF-style games in which fictional environments will be compromised. Finally, attendees will receive guidance on how to continue their training after these sessions.
[R25RL01] LAB Introducción al Hardware Hacking con Linuxipal
350€ es + Info REGISTER
Training hours for each day: 09:00h - 20:00h
Explore the Hardware Universe with Linux: discover how Linux can guide you through the fascinating world of hardware. Unveil the secrets and unlimited possibilities that this combination can offer. Master the Fundamentals of IoT and Embedded Systems: Dive deep into the heart of IoT technology. Understand the key differences and unique applications of devices like Raspberry Pi, Arduino, and routers. Transform your curiosity into practical knowledge. Learn how to create devices with an offensive approach, such as a WiFi Pineapple. Discover the secrets of its development and apply that wisdom to your own projects. Master the skill of soldering using various tools such as hot air guns, soldering irons, and microscopes. Immerse yourself in the inner workings of everyday and specialized devices like thermostats, sensors, security alarms, portable medical devices, fitness bands, and robots. Understand their mechanics and apply that knowledge to innovate and create. THIS ROOTEDLAB INCLUDES MATERIAL!!
[R25RL02] Escalada privilegios en Linux Lab
250€ es + Info REGISTER
Training hours for each day: 09:00h - 20:00h
When we talk about GNU/Linux, we refer to an operating system present in 100% of supercomputers, more than 80% of servers, and a wide range of devices such as mobile phones, routers, televisions, and more. Knowing and applying privilege escalation and persistence techniques in these systems is of great importance, both for those involved in offensive security and defensive security. In the workshop exercises, the following will be covered: the concepts of privilege escalation and persistence will be explained, a thorough enumeration of vulnerable systems will be conducted to find escalation paths, various privilege escalation and persistence techniques will be applied, understanding the principles behind them and their potential impact on systems, and the traces left by actions performed during privilege escalation and persistence will be explained, enabling their detection.
[R25RL03] Defensive and offensive steganography Hands on keyboard
250€ es + Info REGISTER
Training hours for each day: 09:00h - 20:00h
The goal of this workshop is to understand and practice steganographic techniques and tools from both a defensive and offensive perspective. This hands-on workshop will focus on three aspects: using steganography as an anti-forensic science to hinder the detection of information in file systems and operating systems, practical steganography in multimedia content, and steganography applied to malware.