What can we help you with?

Supercharged PAM

Combine the best of Session Management and Credential Management solutions at a new, incredible value!

Learn More Learn More

What is BeyondTrust?

Get a closer look inside the BeyondTrust identity & access security arsenal.

Learn More Learn More

Gartner Peer Insights

Find out how customers & analysts alike review BeyondTrust.

Learn More Learn More

Go Beyond Customer & Partner Conference

Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.

Learn More Learn More

Watch Our Video

Find out more about our integrations.

Learn More Learn More

Leader in Intelligent Identity & Secure Access

Learn how BeyondTrust solutions protect companies from cyber threats.

Learn More Learn More

Featuring guest speaker, Co-Founder and CTO of InGuardians, Jay Beale

In this demo-heavy webinar, Jay Beale attacks a Linux capture-the-flag (CTF) machine, demonstrating how an attacker can use a chain of vulnerabilities to compromise a system. Jay will then put on his white hat and demonstrate a defense to break the attack chain.

Milnet is an intentionally-vulnerable capture-the-flag puzzle, created by Sebastian Brabetz and inspired by Cliff Stoll's book, The Cuckoo's Egg. The Cuckoo's Egg, one of the first bestselling books detailing a real hacking incident, landed Cliff Stoll on the New York Times, the floor of the US Senate, and, most recently, keynoting Ed Skoudis' Pen Test Hackfest Summit. In the book, Stoll tells the true-to-life story of how he caught a hacker. In the webinar, we'll be playing the hacker. If you like, you can even download the virtual machine from Vulnhub.com and follow along in this webinar, repeating the attack step by step.

Don't miss this fun and instructive webinar and the chance to get in the hacker’s seat to improve your Linux security chops!

Photograph of Jay Beale

Jay Beale, CEO, CTO at InGuardians, Inc.

Jay Beale has created several defensive security tools, including Bastille Linux/UNIX and the CIS Linux Scoring Tool, both of which were used widely throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the “Stealing the Network” series. He has led training classes on Linux Hardening and other topics at Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training. Jay is a co-founder, Chief Operating Officer and CTO of the information security consulting company InGuardians.