RESOURCE LIBRARY

Watch. Learn. Apply. Share

Dr. Zero Trust using the No Code, Drag and Drop HyperQube Cyber Range

How can you use the HyperQube Cyber Range to empower your sales force, users, and researchers with effective virtualization? In this demo, Dr. Chase Cunningham (aka Dr. Zero Trust) demonstrates how he leverages the power of the HyperQube Cyber Range to create as many virtual environments needed to do anything from malware research and product demos to POC’s and architecture design – and everything in between.

Webinar Series:  Know Thy Enemy Through Testing and Validation

 

VIDEO COMING SOON

Episode 3: Active Directory Security: What Needs Immediate Priority

Securing Active Directory (AD) is no longer an option, but a mandate. With attacks on AD at an all-time high, companies overlooking this vulnerable point of entry are being punished both monetarily and with loss of production. Join Craig Stevenson, CEO of HyperQube and Derek Melber, Chief Technology & Security Strategist at Tenable as they:

 

  • Discuss the importance of AD security and vulnerability management prioritization
  • Review common attack paths and the importance of AD to attackers
  • Demonstrate how to disrupt AD attacks
  • Provide a live demo of AD testing

Episode 1: Credential Dumping: Analysis, Detection and Prevention

Bad actors have infiltrated your network. But, how do you know you’re compromised? Watch as Craig Stevenson, CEO of HyperQube and Gabe Martinez, CEO of Analytica42 demonstrate:

  • All the steps of a Mimikatz attack
  • How Credential Dumping enables Lateral Movement
  • How to analyze the attack and build detection
  • Proactive prevention

Episode 2: Container Vulnerability Validation

Containers offer speed and convenience, but sacrifice security. How do you validate and prioritize container vulnerabilities? Join Craig Stevenson, CEO of HyperQube and Greg Dharma LePard, Sales Engineer from Rezilion as they:

  • Demonstrate how to build live infrastructure with the HyperQube Cyber Range

Use Rezilion Prioritize to:

  • Validate and prioritize container vulnerabilities
  • Identify and remove unused, bloated code
  • Create a catalog of certified container images

HyperQast: A Technology Podcast Series

HyperQast Episode 1: DLL Search Order Hijacking

What is it? How do hackers use it? How can you detect/stop it?  What happens immediately after a Hacker gains access to a computer?  Most people think that they just download some files or launch some ransomware and it’s over.  But the actual first steps are a little bit harder than that.  Our curious founder, Craig Stevenson, along with professional Penetration testers from BreachBits break down the steps of an attack and what role DLL Hijacking plays within that attack using the HyperQube Cyber Range.

HyperQast Episode 2: The Business of Ransomware

Hacking is a business. A hacker’s goal is to monetize their unauthorized access to your system. The market has shown us that the best way to do that is through Ransomware. Curious Craig along with professional penetration testers Miguel and John from BreachBits do a deep dive into the world of Ransomware.

HyperQast Episode 3: Cyber Ranges & ZTEdge with Dr. Zero Trust!

Cyber Ranges are an important asset to leverage for a Zero Trust implementation. ZTEdge is a Zero Trust cloud security platform that cuts complexity, reduces cyber-risk, and improves performance, at half the cost of other solutions. Curious Craig along with Dr. Zero Trust (Chase Cunningham) discuss the difficulties of building your own Cyber Range as well as how ZTEdge supports a Zero Trust implementation.

HyperQast Episode 4 – Part 1: Active Directory Security: Historical Lessons and Today’s Issues

Active Directory (AD) has been a part of Windows Security since its release with Windows 2000 Server. Craig along with Derek Melber, the Chief Technology & Security Strategist at Tenable (who is also a 17 time Microsoft MVP, in both Active Directory and Group Policy) discuss the history of Active Directory, as well as the 5 must know AD security practices.

A Hacker’s Approach Video Series

Reconnaissance

Have you ever wondered how computers in your network would respond to a hacker coming after them? And, is the cybersecurity system you have in place able to quickly identify each possible point of entry? Watch as our CEO Craig Stevenson demonstrates the 2 most common active scanning techniques a hacker will use to identify targets within your network in the HyperQube Cyber Range.

Keylogging

What is it? How does it work? How do hackers use this technique to gather intelligence? As a sub-technique of “Input Capture” from the MITRE ATT&CK framework, Keylogging is the most prevalent type of input capture hackers use to intercept credentials. Watch as our CEO Craig Stevenson plays the role of hacker and demonstrates how an adversary captures all the keystrokes that happen on their target’s computer. He is able to safely do this as he’s already built an environment using the HyperQube Cyber Range.

Screen Capture

What is it? How do hackers use this technique to gather intelligence? Screen Capture is a sub technique of Collection from the MITRE Attack Framework. Once a hacker gains control of a system, Collection consists of techniques (such as screen capture) that hacker may use to gather information. Specifically, Screen Capture is where a hacker takes screen shots of their victim’s computer while they’re using it Watch as our CEO Craig Stevenson plays the role of hacker and demonstrates how an adversary uses Screen Capture to gather information on their target’s computer. He is able to safely do this as he’s already built an environment using the HyperQube Cyber Range.

Our Partners