HackingDept

What is HackingDept?

We teach how to practically perform attacks on diverse environments so that if an actual attack occurs, you can respond immediately.

HackingDept is the offensive IT security training platform for systematic improvement of qualifications, knowledge update, based on actual methods employed by HACKERS.

In comparison to traditional online training courses, our solutions offer the ability to learn via practical actions directly within the infrastructure consisting of virtual elements and software on physical or virtual devices.

Products

HackingDept box version

It is a closed and mobile environment, galvanically isolated from the Client’s network, with fully automated management.

It was created utilizing virtual technology, integrated with physical devices employed during attacks. The entire set is connected with a telecommunication and application infrastructure – all ran on coherent offensive IT security training scenarios. Additionally, there is malware lab provided for most advanced users – secure forensic environment to analyse malware.

 

HackingDept cloud version

The HackingDept cloud version offers full scalability, the possibility of access for hundreds of users working simultaneously. Each user has a full stack (virtual machines) containing the entire work environment for their own use.

Each of the participants in the training has an individual account containing full information about the completed training, progress and acquired competences.

The version enables automated configuration, coordination and management of computer systems and software, including mass configuration, creation, modification and deletion of virtual machines, task automation between the virtual infrastructure and other system components.

There is no access to scenarios requiring access to hardware devices in the HackingDept cloud version.

Scenarios

The scenarios also include each layer of telecommunication infrastructure under attack:

 

  • telecommunications infrastructure (including GSM);
  • wired and wireless network infrastructure (including LAN and WLAN);
  • portals and web applications;
  • database systems;
  • diverse operating system environments;
  • extensive Active Directory infrastructure;
  • mobile applications;
  • “embedded” systems (incl. IoT, PLC drivers);
  • ACS – Access Control Systems (e.g., proximity card copying).

 

The HackingDept scenarios include advanced attack techniques:

 

  • AD infrastructure;
  • on web applications;
  • via aggressive BTS;
  • based on RTOS firmware analysis;
  • based on social engineering;
  • via specialized training malware;
  • based on exploitation and reverse engineering;
  • based on proximity card copying;
  • allowing privilege escalation in the most commonly used operating systems.

 

New scenarios, relating to the latest attacks, are delivered in the monthly subscription model as annual packages.

You may watch sample PRESENTATION scenario here:

https://youtu.be/nMlbVSd7OSw


Knowledge base

All HackingDept scenarios are explained in detail, using training materials on the topics used in the scenarios (knowledge base).

The knowledge base is constantly updated with information from the latest attacks targeting detected vulnerabilities.

Application

We have created baseline scenarios – analysed, documented and based on real attacks. They are divided into three categories, depending on the business angle:

 
  • PRESENTATION - tools designed to effectively present actions and projects in image formats at conferences and internal meetings conducted by the security team. Also used to raise awareness on security matters among employees of the organization;
  • RECRUITMENT - practical verification of skills and qualifications of specialists recruited into the security team.
  • TRAINING - designed to systematically improve the qualifications of the security team. Knowledge base for the newest forms of attacks. Practical activities in a virtual environment.

Market

Our unique solutions address the material needs of security teams in each organization like:

 
  • banking and finance (online banking applications and systems);
  • industrial sector, including entities utilizing critical infrastructure (PLC drivers, industrial automation, electronic customer service centres);
  • Technical universities;
  • e-commerce (web applications, online transaction portals);
  • telecommunications operators;
  • public administration (online service portals);
  • Law Enforcement Agencies;
  • logistics operators.

Team

About us

Our crew consists only of enthusiasts - experienced pentesters, IT security researchers and programmers. We have two things in common: we love hacking and we want to share it.

WE ARE WHITE HAT HACKERS.

In HackingDept we believe that only through practical training, not only in defence, but also in offensive, one can keep pace with today's constantly changing world. In our opinion, one of the best ways to polish your search techniques and exploit errors is the international IT security competition called Capture the Flag.

CTF teams

HackingDept staff are members of the best Polish CTF groups being successful in the global struggle, often showing that they are among the world's leading experts in the field of ICT security.

More information and ratings: https://ctftime.org/

Dragon Sector

The current and triple world champion and one of the most successful CTF teams. It was established in 2013 and won the CTFtime classification for the first time in the following season. Since the beginning of his activity, it has stood on the podium of this ranking six times. By the end of last season, the team had over 28 victories in international competitions.

p4

Bronze medallist in the CTFtime ranking in 2018, second team in Poland. It boasts fourth place in 2019 and fifth place in 2016. Over the past four years, the team has stood on the podium of international competitions almost 50 times.

Who cooperate with HackingDept

Send Message