On the Shoulder of Giants: Reviving WSUS Attacks

<< Back to Sessions On the Shoulder of Giants: Reviving WSUS Attacks In 2015, Paul Stone and Alex Chapman presented a novel attack at the BlackHat USA conference. Their talk covered their exploration of the usual enterprise deployment of the Windows Update...

Forget your Perimeter: From Phishing Email to Full VPN Compromise

<< Back to Sessions Forget your Perimeter: From Phishing Email to Full VPN Compromise Like it or not, the perimeter has been a necessary line of defense to protect corporate networks from adversaries. Virtual Private Networks (VPNs) appliances are exposed on...

Unicode vulnerabilities that could byte you

<< Back to Sessions Unicode vulnerabilities that could byte you The number of Unicode code points has never stopped growing just like its integration in modern technologies. Web applications you have developed or used are likely to support input and output...

Blue team 101 – analyses, procédures et astuces pour débuter

<< Back to Sessions Blue team 101 – analyses, procédures et astuces pour débuter Les menaces et attaques sont récurrentes sur les infrastructures. On tente donc de constamment améliorer nos systèmes afin de détecter et de prévenir les attaques. Mais,...