Loading…
or to bookmark your favorites and sync them to your phone or calendar.
Venue: Mattie Silks clear filter
arrow_back View All Dates
Friday, February 7
 

10:00am MST

Dial For Deception
Friday February 7, 2025 10:00am - 12:00pm MST
Vishing—using phone calls as an attack vector—remains an effective and often underestimated form of social engineering. In this hands-on workshop, Jason Downey, a Penetration Tester for Red Siege, will walk you through how attackers conduct reconnaissance, build convincing pre-texts, and execute successful vishing scenarios. With its low risk and high reward, vishing is a technique both penetration testers and defenders need to understand. This workshop isn’t just for red teamers—defenders will gain valuable insights into processes and strategies that can help prevent and detect vishing attacks. The session concludes with an interactive AI-powered Vishing CTF, where you’ll have the chance to practice and refine your skills in a fun, realistic environment.
Speakers
avatar for Jason Downey

Jason Downey

Security Consultant, Red Siege
Jason Downey has over ten years of professional experience in IT and information security ranging in a variety of roles in network security roles with additional experience in systems administration. Jason has spoken in front of various audiences ranging from youth initiatives to... Read More →
Friday February 7, 2025 10:00am - 12:00pm MST
Mattie Silks

1:00pm MST

The Azure Misconfigurations That Could Cost You: Detect, Exploit, Remediate
Friday February 7, 2025 1:00pm - 3:00pm MST
Your organization’s recent red teaming exercise revealed critical gaps in detecting advanced attacks, which bypassed the out-of-the-box detections. Your Azure environment proved to be containing several misconfigurations, which led to a comprehensive breach.

In this workshop we will explain several common misconfigurations that can lead to a severe compromise. We'll provide access to an environment which has some of these misconfigurations applied. You will simulate a successful device code phishing attempt after which you will collect data with AzureHound which data we will use to find possible attack paths. We will teach you how to find some of these misconfigurations and how to detect or remediate them.

The lab will have 1 challenge in there that will award a prize to the first to successfully exploit it.

Requirements:
Non corporate laptop with internet access
Docker installed, ideally with a working BloodHound installation.
Speakers
avatar for Henri Hambartsumyan

Henri Hambartsumyan

Henri Hambartsumyan is an experienced technical security professional, with 10 years of technical security experience. Henri started his career as pentester and moved to the more advanced pentesting projects. Later he started executing "covert operations", which the industry later... Read More →
avatar for Olaf Hartong

Olaf Hartong

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Mattie Silks
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -