HYPERQUBE BLOG

Thought Leadership. News. Advice.

HyperQast EP4 – PT 1: Active Directory Security: Historical Lessons and Today’s Issues

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Craig Stevenson, alongside a bevy of subject-matter experts, they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP4 – Part 1: Active Directory Security: Historical Lessons and Today’s Issues

Active Directory (AD) has been a part of Windows Security since its release with Windows 2000 Server. Craig along with Derek Melber, the Chief Technology & Security Strategist at Tenable (who is also a 17 time Microsoft MVP, in both Active Directory and Group Policy) discuss the history of Active Directory, as well as the 5 must know AD security practices.

WEBINAR SERIES: KNOW THY ENEMY THRU TESTING AND VALIDATION

Episode 3:  Active Directory Security: What Needs Immediate Priority

Securing Active Directory (AD) is no longer an option, but a mandate. With attacks on AD at an all-time high, companies overlooking this vulnerable point of entry are being punished both monetarily and with loss of production.

On Thursday October 14th, 2pm ET join Craig Stevenson, CEO of HyperQube and Derek Melber, Chief Technology & Security Strategist at Tenable as they:

  • Discuss the importance of AD security and vulnerability management prioritization

  • Review common attack paths and the importance of AD to attackers

  • Demonstrate how to disrupt AD attacks

  • Provide a live demo of AD testing

Click the image below and register TODAY!

HyperQast EP3: Cyber Ranges & ZTEdge with Dr. Zero Trust

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP3: Cyber Ranges & ZTEdge with Dr. Zero Trust

Cyber Ranges are an important asset to leverage for a Zero Trust implementation.  ZTEdge is a Zero Trust cloud security platform that cuts complexity, reduces cyber-risk, and improves performance, at half the cost of other solutions. Curious Craig along with Dr. Zero Trust (Chase Cunningham) discuss the difficulties of building your own Cyber Range as well as how ZTEdge supports a Zero Trust implementation.

Webinar August 25, 2021: Container Vulnerability Validation

Containers offer speed and convenience, but sacrifice security. How do you validate and prioritize container vulnerabilities?  Watch Craig Stevenson, CEO of HyperQube and Greg Dharma LePard, Sales Engineer from Rezilion as they:

  • Demonstrated how to build live infrastructure with the HyperQube Cyber Range

  • Used Rezilion Prioritize to:

    • Validate and prioritize container vulnerabilities

    • Identify and remove unused, bloated code

    • Create a catalog of certified container images

WEBINAR SERIES: KNOW THY ENEMY THRU TESTING AND VALIDATION

Episode 2:  Container Vulnerability Validation

Containers offer speed and convenience, but sacrifice security. How do you validate and prioritize container vulnerabilities? Join Craig Stevenson, CEO of HyperQube and Greg Dharma LePard, Sales Engineer and Solutions Architect from Rezilion as they:

  1. Identify and validate vulnerabilities
  2. Prioritize vulnerabilities
  3. Remove unused, bloated code
  4. Create a catalog of certified container images
Click the image below and register TODAY!

HyperQube Included in WWT’s Advanced Technology Center!

HyperQube has been included in World Wide Technology‘s Advanced Technology Center (ATC) ‘ecosystem’ where engineers will discover what they can build, share and accomplish with HyperQube! (click here to read)

From Chris Konrad at WWT, “The World Wide Technology ATC HyperQube Proving Ground Lab exists to help people create VMware environments and exact replicas of current environments in under 30 seconds. This solution seeks to conquer business problems such as long set up times and bad configurations when it comes to setting up virtual environments.”

For more information on WWT’s ATC, visit: https://lnkd.in/dw6Sq92

HyperQast EP2: The Business of Ransomware

HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP2: The Business of Ransomware

Hacking is a business. A hacker’s goal is to monetize their unauthorized access to your system. The market has shown us that the best way to do that is through Ransomware. Curious Craig along with professional Penetration testers Miguel and John from BreachBits do a deep dive into the world of Ransomware.

HyperQast EP1: DLL Search Order Hijacking

INTRODUCING HYPERQAST:  A TECHNOLOGY PODCAST.

Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they’re digging into topics from Cybersecurity to software development and everything in between!

 

EP1: DLL Search Order Hijacking

What is it? How do hackers use it? How can you detect/stop it?  What happens immediately after a Hacker gains access to a computer?  Most people think that they just download some files or launch some ransomware and it’s over.  But the actual first steps are a little bit harder than that.  Suppose someone clicks on a malicious email and as a result has let a hacker onto their computer.  If the hacker does nothing and that user reboots their computer, the hacker no longer has access.  So the hackers first goal is to establish Persistence.  Straight from the Mitre ATT&CK framework, “Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access.”  One way to establish persistence is through a technique called DLL Search Order Hijacking.  But first a bit of background on what a DLL is and how Windows uses them.  

A DLL is a file that contains code and data that can be used by more than one program at the same time.  These files have a lot of advantages.  They allow programs to use fewer resources by avoiding duplication and they can increase security.  If you fix a security hole in a DLL then all the programs that use that DLL automatically get fixed as well.  When a windows program starts it searches for the DLL’s it needs by looking through directories on the hard drive in a specific order.  This is known as the DLL search order.  If you drop a malicious DLL in the right directory Windows will load it before finding the legitimate library. 

Our curious founder, Craig Stevenson, along with professional Penetration testers from BreachBits break down the steps of an attack and what role DLL Hijacking plays within that attack.

Screen Capture: A Hacker’s Approach

Screen Capture:  What is it?  How do hackers use this technique to gather intelligence?

As a sub-technique of “Collection” from the MITRE ATT&CK framework, Screen Capture is where a hacker takes screen shots of their victim’s computer while they’re using it.  Watch as our CEO Craig Stevenson plays the role of hacker and demonstrates how an adversary uses Screen Capture to gather information on their target’s computer.

Keylogging: A Hacker’s Approach

Keylogging:  What is it?  How does it work?  How do hackers use this technique to gather intelligence?

As a sub-technique of “Input Capture” from the MITRE ATT&CK framework, Keylogging is the most prevalent type of input capture hackers use to intercept credentials.  Watch as our CEO Craig Stevenson plays the role of hacker and demonstrates how an adversary captures all the keystrokes that happen on their target’s computer.