Главная
Study mode:
on
1
Intro
2
Why is this interesting?
3
The New Normal: Your network perimeter
4
Risk at Enterprise Scale
5
Tools of the trade
6
Malicious traffic is a global problem
7
Forensics & Threat Intel
8
Attack timeline: Citrix LFI (CVE-2019-19781)
9
Shodan hunting 101
10
Down the rabbit hole
11
Advanced fingerprinting techniques
12
Fingerprinting case studies
13
Closing Thoughts
Description:
Explore network security challenges in the era of remote work and IoT devices in this 26-minute conference talk by Nate Warfield, a security researcher at Microsoft. Discover how the network perimeter has shifted, bringing previously banned devices inside corporate networks. Learn practical tips for managing these new risks, including tools for threat detection and forensics. Dive into a case study on the Citrix LFI vulnerability (CVE-2019-19781) and gain insights into Shodan hunting techniques. Acquire advanced fingerprinting skills and understand their applications in real-world scenarios. Gain valuable knowledge to enhance your organization's cybersecurity posture in this rapidly evolving landscape.

Wash Your Hands! This Is Bot Country

Kaspersky
Add to list