Free Trial
Free Trial

hack_it 2022 0-Day

November 14, 2022 | 12pm4pm ET | A Virtual Hands-On Hacking Training Lab

Cost: $99 USD 

Register Now

Cybersecurity Strategy: Are You Playing Offense or Defense?

When two opposing sides face off, each has its own offensive and defensive tactics in play. The former usually focuses on exploiting your opponent’s weaknesses, while the latter is designed to protect your interests. 

As cybersecurity professionals, we often find ourselves playing defense and reacting to the moves of our opponents... but what if we could bring a bit more offense to the table?

In this half-day session, we’ll dig into both sides of the cybersecurity game. Join us and discover whether defense can actually win championships—or if the best defense is in fact a great offense.

For hack_it 2022, we're introducing NEW CONTENT in a modernized virtual environment and updated tactics, techniques and tradecraft.

Agenda (All Times ET):

  • 12:00–1:00pm: Dedicated Setup Time*
  • 1:002:20pm: Offense Part 1: Making Hackers Earn Their Access
  • 2:202:30pm: Break
  • 2:303:30pm: Offense Part 2: Making Hackers Earn Their Access
  • 3:303:40pm: Break
  • 3:403:45pm: Defense: Analyzing Your Network
  • 3:454:00pm: Wrap Up/Q&A

* Dedicated set-up time will be used to ensure members of the class are prepared and comfortable working within the virtual environment. If you join the session later than the allocated setup time, there may not be enough active support to help you get situated.

Meet Your Hackers

Caleb Stewart

Security Researcher

Dave Kleinatland

Security Researcher

Henry Washburn

Sales Engineering Manager

Jason Phelps

MSP Sales Engineer

John Hammond

Senior Security Researcher

Todd Painter

Senior Security Engineer

Additional Info & Logistics

This course arms students with the skills to gain initial access, evade antivirus, establish a persistent foothold and exfiltrate sensitive data. In each lab, students use common exploitation techniques to compromise victim VMs. With this knowledge, you’re better prepared to quickly identify and respond to Windows-based attacks and breaches.

Whether you're a keyboard junky or have worked your way into management, you'll succeed in this class as long as you have these fundamental skills:

-Familiarity with Windows system administration and troubleshooting
-Some experience using the Windows or Linux command line interface
-A functional understanding of networking (IP addressing, ports, protocols)
-Understanding of cybersecurity terminology (exploits, keyloggers, injection)

You will need a computer capable of running Zoom, Slack (optional for support/chatter), and Remote Desktop. 

The instructors will present over the Zoom conferencing platform. It’s not necessary to have a microphone or webcam as a student, but headphones or speakers are a must. While chatting in Zoom we recommend you select “All panelists and attendees” as the recipient of your messages to encourage discussion among peers. Please be respectful of others and don’t give out any answers in public discussion as to not spoil the challenges for anyone.

We'll have a support Slack channel set up for attendees during the 0-Day sessions. We'll send out invitations to join the Slack channel to event registrants as we get closer to the event. Feel free to join it for discussion about getting set up and troubleshooting. We may also discuss some of the challenges in an out-of-band manner in here as well, but everything you need in terms of course content will be in the Zoom meeting. Slack allows us to easily engage 1-on-1 with attendees if necessary as well as leverage screen sharing without interrupting the connection to the Zoom webinar.

Remote Desktop
The hands-on portion of this course is powered by an Azure Labs student virtual machine. The attacker and victim VMs are nested virtual machines within the student host. 

-Windows Machines: To connect to your student VM from Windows machines, the built in “Remote Desktop Connection” application is typically sufficient. In some edge cases you may experience a protocol error in Windows 10. In these cases the quickest path to resolution is to download the “Microsoft Remote Desktop” 1st party application from the Microsoft Store. 
-MacOS machines: We recommend the Microsoft created “Microsoft Remote Desktop” from the Apple app store.  
-For Linux users: FreeRDP and Remmina have been tested to work. rdesktop commonly produces the protocol error mentioned above. Azure Labs generates a random hostname and port number for the connection profile. 
-You will need to be able to connect to * on a random port number, typically greater than 50,000.
Questions? Please contact