Главная
Study mode:
on
1
Intro
2
Jerods background
3
F5 report
4
Passive intelligence gathering
5
Pastebin
6
Passwords
7
Social Media Quizzes
8
Software as a Service
9
Attack vectors
10
The challenge
11
Provisioning deprovisioning
12
Attributes
13
Help Desk
14
Red Team
15
Document Metadata
16
Technology Stack
17
Password Spray
18
Home Lab Tools
19
TwoFactor
20
Facebook
21
Social Media Quiz
Description:
Explore the world of Identity and Access Management (IAM) from a penetration tester's perspective in this comprehensive conference talk. Delve into passive intelligence gathering techniques, including the use of Pastebin, password analysis, and social media quizzes. Examine various attack vectors and challenges in IAM, such as provisioning and deprovisioning processes, attribute management, and help desk vulnerabilities. Learn about red team strategies, document metadata analysis, and technology stack considerations. Discover practical tools for setting up a home lab and gain insights into two-factor authentication and social media security. Enhance your understanding of IAM security through hands-on examples and real-world scenarios presented by experienced security professional Jerod Brennen.

Hacking Identity - A Pen Tester's Guide to IAM

Add to list
0:00 / 0:00