event (‘date’):
July 26, 2025
(‘language’) of participation:
=English
‘event location’ and (‘format’):
(in-person in Moscow)

Positive Hack Camp

Event
Positive Hack Camp, organized by Positive Technologies with support from the Russian Ministry of Digital Development, has concluded in Moscow. This prestigious international event, held over two weeks, gathered 70 cybersecurity experts from around the globe to gain insights from leading Russian specialists in IT infrastructure protection and cybersecurity.
ways to elevate privileges in information systems, websites, operating systems and network infrastructures.
You will
how to imitate attacks on IT-infrastructure and investigate security systems using vulnerability exploitation tools
tools for analyzing network and protocol traffic and adjusting client-service communication.
Participation
flight to Moscow and back
(From.You)
Complimentary
you know how internet and local networks work
your english is at least at B1 level
Please note that you will definitely need to bring a laptop with you
Feel free to submit an application if:
!Requirements!
you know how to work with Linux or Windows at an advanced user level (installing packages/programmes and configuring basic functions)
you know what virtualisation (VMware) is and how it works
training
accommodation
cultural program
meals
laptop requirements
Modern operating system (Minimum: Windows 10 x64, Linux, MacOS)
Support for hardware virtualisation (Intel VT-x, AMD-V)
HDD/SSD hard drive with at least 256 GB of free space
Processor with at least eight cores with a frequency of at least 2.3 GHz
8GB of DDR3 RAM
Course
/Introduction/ to the course:
Preparing the working environment for the practical assignments, Preparing the cloud environment for practical tasks.
Module description will be added later.
/white/ hacking:
Introduction.
White hacker's roadmap.
Module description will be added later.
/level 1/ Reconnaissance in the customer’s external infrastructure:
Organization domain name search.
Network scanning.
Network nodes scanning.
Port scanning.
Module description will be added later.
/level 2/:
Primary Access Attacks
Module description will be added later.
/level 2.1/ Web-application hacking:
Authentication bypass vulnerabilities.
OS command injection vulnerabilities.
Access control vulnerabilities.
Directory access control vulnerabilities.
SQL injection vulnerabilities.
XML external entity injection vulnerabilities.
Cross-site scripting (XSS) attacks.
Module description will be added later.
/level 2.2/ Known vulnerabilities in network services exploitation:
Exploiting one-day vulnerabilities in network services.
Module description will be added later.
/level 2.3/ social engineering:
Research for email addresses of employees in an organization.
Module description will be added later.
/level 3/ securing access:
Obtaining legitimate access to the system.
Practice "Securing access".
Module description will be added later
/level 4/ Privilege escalation on server systems:
Exploitation of Linux administration errors.
Practice "Privilege escalation on server systems in Linux".
Module description will be added later.
/level 5/ Going beyond the DMZ:
Network Scanning.
Analyze DMZ network traffic.
MitM attacks on nodes in a DMZ network.
Module description will be added later.
/level 6/ Network traffic forwarding:
Using standard protocols for traffic forwarding.
Practice "Traffic Forwarding".
Module description will be added later.
/level 7/ Network reconnaissance and compromise of Windows machines:
Detecting Windows machines on the network.
Compromising Windows machines on a network.
Module description will be added later.
/level 8/ Privilege escalation on local network nodes:
Extracting secrets and credentials.
Exploiting Windows OS configuration vulnerabilities.
Exploiting known Windows OS vulnerabilities.
Module description will be added later.
/level 9/ Capturing network infrastructure management:
Exploitation of domain controller node vulnerabilities.
Collecting information about objects in the domain.
Exploitation of service misconfigurations in AD.
Module description will be added later.
/level 10/ Detection and response counteraction:
Reducing activity on the network.
Use of encrypted communication channels.
Using IP switching tools.
Module description will be added later.
/hacker/ development:
Ethics.
Independent study materials.
Module description will be added later.
Positive Hack Camp 2025
for
Positive Hack Camp 2025
for
for
Positive Hack Camp 2025
We started processing it and will reach out to you.
Your application has been submitted!
Company Name: Joint Stock Company “Positive Technologies”
Legal Address: 107061, Moscow, intracity territory of the municipal district Preobrazhenskoye, Preobrazhenskaya Square, Building 8, Room 60
INN (Taxpayer Identification Number): 7718668887
OGRN (Primary State Registration Number): 1077761087117
Email: pt@ptsecurity.com
Phone: +7 (495) 744-01-44
If you have any questions please email us:
We use cookies to provide website functionality, to analyse the traffic and to show you relevant advertising. Our Cookie Notice provides more information and explains how you can adjust your cookie settings. Cookie Notice
Cookie Preferences
When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Essential cookies
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Performance cookies
Disabled
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Targeting cookies
Disabled
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Fuctional cookies
Disabled
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.