FS: LESSONS LEARNED FROM A DECADE OF DATA BREACHES
3
LET'S TALK ATTACK SURFACE
4
PEN TESTING TEN EIGHT STEP PROCESS
5
TLA'S AND FLA'S
6
USER LIFECYCLE
7
WHO (TRADITIONALLY) DOES WHAT!
8
OSINT GATHERING
9
DOCUMENT METADATA
10
WHAT ARE WE LOOKING FOR AGAIN?
11
PASSWORD SPRAYING
12
SOCIAL ENGINEERING (SE)
13
SE ATTACK SCENARIOS
14
PASSWORD SELF-SERVICE
15
SELF-REGISTRATION
16
ANALYZE YOUR EXTERNAL ATTACK SURFACE
17
REDUCE SAID ATTACK SURFACE
18
TIGHTEN UP ADMIN PRIVILEGES
19
DETECTION IS KING
20
MISDIRECTION
21
FUNDAMENTALS FTW
Description:
Explore a comprehensive guide to Identity and Access Management (IAM) pen testing in this 58-minute conference talk from BSides Cleveland 2018. Delve into lessons learned from a decade of data breaches, attack surface analysis, and the eight-step pen testing process. Examine user lifecycle management, traditional roles, and OSINT gathering techniques. Learn about password spraying, social engineering attack scenarios, and self-service password management. Discover strategies to analyze and reduce external attack surfaces, tighten admin privileges, and implement effective detection mechanisms. Gain insights on misdirection tactics and reinforce fundamental security principles to enhance your organization's IAM defenses.