{"id":371,"date":"2020-09-17T12:15:00","date_gmt":"2020-09-17T17:15:00","guid":{"rendered":"http:\/\/3.134.223.139\/?p=371"},"modified":"2021-04-20T21:37:43","modified_gmt":"2021-04-21T02:37:43","slug":"spiceworld-virtual-2020-practical-hacking","status":"publish","type":"post","link":"https:\/\/globetech.biz\/index.php\/2020\/09\/17\/spiceworld-virtual-2020-practical-hacking\/","title":{"rendered":"Spiceworld Virtual 2020 Practical Hacking"},"content":{"rendered":"\n<h5 class=\"has-text-align-center has-text-color wp-block-heading\" style=\"color:#ff8606\">Spiceworks Annual IT Conference<\/h5>\n\n\n\n<h6 class=\"has-text-align-center wp-block-heading\" style=\"font-size:14px\">&#8221; <a href=\"https:\/\/www.spiceworks.com\/spiceworld\/\">https:\/\/www.spiceworks.com\/spiceworld\/<\/a> &#8220;<\/h6>\n\n\n\n<p>For the past few years, I&#8217;ve been going to SpiceWorld and took the opportunity this year to present. My session was focused around &#8220;practical hacking&#8221;, as in, the simple flaws that I&#8217;m going to search for in your network and how I would take advantage of them to overrun your network. <\/p>\n\n\n\n<p>The session material is available up to 6 months after the virtual conference by going to spiceworks, but I&#8217;ve opted to host the same information here. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"420\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2021\/04\/Spiceworks2020Ratings.png\" alt=\"\" class=\"wp-image-557\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2021\/04\/Spiceworks2020Ratings.png 638w, https:\/\/globetech.biz\/wp-content\/uploads\/2021\/04\/Spiceworks2020Ratings-300x197.png 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><figcaption>Rated #1 breakout session of Spiceworld 2020<\/figcaption><\/figure><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-right has-text-color wp-block-heading\" style=\"color:#ff8606\">The Presentation<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"SpiceWorld 2020 - PracticalHacking\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/wezu-NftOIw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-right has-text-color wp-block-heading\" style=\"color:#ff8606\">The PowerPoint Slides<\/h2>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/09\/SW2020_PracticalHacking.pptx\">SW2020_PracticalHacking<\/a><a href=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/09\/SW2020_PracticalHacking.pptx\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-align-right has-text-color wp-block-heading\" style=\"color:#ff8606\">The Reference Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Password Length Related Info<ul><li><a href=\"https:\/\/www.secplicity.org\/2019\/05\/01\/three-updated-password-best-practices-for-world-password-day-2019\/\">https:\/\/www.secplicity.org\/2019\/05\/01\/three-updated-password-best-practices-for-world-password-day-2019\/<\/a> <\/li><\/ul><\/li><li>Cred Defense Toolkit<ul><li><a href=\"https:\/\/www.blackhillsinfosec.com\/the-creddefense-toolkit\/\">https:\/\/www.blackhillsinfosec.com\/the-creddefense-toolkit\/<\/a><\/li><\/ul><\/li><li>Responder Usage and Mitigations <ul><li><a href=\"https:\/\/www.4armed.com\/blog\/llmnr-nbtns-poisoning-using-responder\/\u2028\">https:\/\/www.4armed.com\/blog\/llmnr-nbtns-poisoning-using-responder\/<\/a><\/li><\/ul><\/li><li>LAPS article<ul><li><a href=\"https:\/\/blog.thesysadmins.co.uk\/deploying-microsoft-laps-part-1.html \u2028\">https:\/\/blog.thesysadmins.co.uk\/deploying-microsoft-laps-part-1.html <\/a><\/li><\/ul><\/li><li>Essential 8 List<ul><li><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/essential-eight-maturity-model\">https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/publications\/essential-eight-maturity-model<\/a><\/li><\/ul><\/li><li>20 CIS Controls<ul><li><a href=\"https:\/\/www.cisecurity.org\/controls\/cis-controls-list\/\">https:\/\/www.cisecurity.org\/controls\/cis-controls-list\/<\/a><\/li><\/ul><\/li><li>Canary PI<ul><li><a href=\"https:\/\/github.com\/hackern0v1c3\/CanaryPi\u2028\">https:\/\/github.com\/hackern0v1c3\/CanaryPi<\/a><\/li><\/ul><\/li><li>Canary Tokens<ul><li><a href=\"https:\/\/canarytokens.org\/generate\u2028\">https:\/\/canarytokens.org\/generate<\/a><\/li><\/ul><\/li><li>Password Generator<ul><li><a href=\"https:\/\/www.lastpass.com\/password-generator\u2028\">https:\/\/www.lastpass.com\/password-generator<\/a><\/li><\/ul><\/li><li>Password Manager application<ul><li><a href=\"https:\/\/keepass.info\/download.html\u2028\">https:\/\/keepass.info\/download.html<\/a><\/li><\/ul><\/li><li>MITRE Attack Framework<ul><li><a href=\"https:\/\/attack.mitre.org\/\">https:\/\/attack.mitre.org\/<\/a><\/li><\/ul><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Spiceworks Annual IT Conference &#8221; https:\/\/www.spiceworks.com\/spiceworld\/ &#8220; For the past few years, I&#8217;ve been going to SpiceWorld and took the opportunity this year to present. My session was focused around &#8220;practical hacking&#8221;, as in, the simple flaws that I&#8217;m going to search for in your network and how I would take advantage of them to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":374,"comment_status":"open","ping_status":"open","sticky":false,"template":"templates\/template-full-width.php","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[12],"class_list":["post-371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presentations","tag-spiceworldvirtual"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/posts\/371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":17,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/posts\/371\/revisions"}],"predecessor-version":[{"id":561,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/posts\/371\/revisions\/561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/media\/374"}],"wp:attachment":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/media?parent=371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/categories?post=371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/tags?post=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}