Главная
Study mode:
on
1
Intro
2
STILL RELEVANT
3
LET'S TALK ATTACK SURFACE
4
PEN TESTING TEN EIGHT STEP PROCESS
5
USER LIFECYCLE
6
WHO (TRADITIONALLY) DOES WHAT
7
OSINT GATHERING
8
DOCUMENT METADATA
9
WHAT ARE WE LOOKING FOR AGAIN
10
PASSWORD SPRAYING
11
ONCE YOU'RE IN...
12
PASSWORD SELF-SERVICE
13
ANALYZE YOUR EXTERNAL ATTACK SURFACE
14
REDUCE SAID ATTACK SURFACE
15
TIGHTEN UP ADMIN PRIVILEGES
16
DETECTION IS KING
17
LOGGING AND MONITORING - WINDOWS
18
FUNDAMENTALS FTW
Description:
Explore the intricacies of Identity and Access Management (IAM) security through a penetration tester's perspective in this conference talk from Converge 2018. Delve into the still-relevant attack surface of IAM systems, learning a comprehensive eight-step pen testing process. Examine the user lifecycle, traditional roles in IAM, and essential OSINT gathering techniques. Uncover strategies for extracting valuable information from document metadata, executing password spraying attacks, and exploiting password self-service features. Gain insights on analyzing and reducing external attack surfaces, tightening administrative privileges, and implementing robust detection mechanisms. Emphasize the importance of logging and monitoring in Windows environments, and reinforce fundamental security principles to enhance overall IAM defenses.

Hacking Identity - A Pen Tester's Guide to IAM - Jerod Brennen

Add to list
0:00 / 0:00