How Hackers Go From Zero to Takeover
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. We’ll show you how hackers:
- Use low-level employee accounts to access sensitive information
- Steal usernames and passwords from a single computer and use them the gain more access
- Elevate their access from standard employee level to administrator
- Spread throughout your network using normal IT tools (to evade detection)
- Leverage seemingly small misconfigurations to fully take over a victim’s environment.
Along the way, we’ll provide you with tips for stopping hackers at every stage. Learn how to thwart hackers with simple configuration changes and strong auditing techniques.
Chief Executive Officer
Sherri Davidoff is the CEO of LMG Security and the author of three books, including “Ransomware and Cyber Extortion” and “Data Breaches: Crisis and Opportunity.” As a recognized expert in cybersecurity, she has been called a “security badass” by the New York Times. Sherri is a regular instructor at the renowned Black Hat trainings and a faculty member at the Pacific Coast Banking School. She is also the co-author of Network Forensics: Tracking Hackers Through Cyberspace (Prentice Hall, 2012), and has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called “Alien.” Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN) and received her degree in Computer Science and Electrical Engineering from MIT.
Penetration Testing Team Manager & Senior Cybersecurity Consultant
Tom is a seasoned hacker and the winner of many hacking competitions including Wild West Hackin’ Fest, Circle City Con, THOTCON, BsidesLV, and DEFCON. Tom leverages his wealth of experience to support LMG Security’s customers as the Penetration Testing Team Manager and a Senior Cybersecurity Consultant. Prior to working for LMG, Tom was the head of software architecture at Businessolver for nearly 20 years.