Are there any attacks that are effective, reliable and almost always work? Of course! The attacks like Pass-The-Hash, Spoofing or SMB Relay are still one of these awesome tactics allow attacker or penetration tester to get to a target organization.
Even though organization manages the infrastructure well, patches are regularly installed, network ismonitored – they are still working perfectly as it is really a matter of misconfiguration rather than serious security vulnerability.
The problem is that some infrastructure mechanisms relay on type of communication used within the attacks and they use it for the normal communication: single sign-on authentication, service accounts, network sharing etc.
Join us in this opening keynote to become familiar with the biggest mistakes in infrastructure security that – from the attacker perspective – can be pretty much always exploited. This keynote will give you suggestions & ideas on how to reach the next level of security in your workspaces.