Loading…
Friday February 7, 2025 1:00pm - 3:00pm MST
Your organization’s recent red teaming exercise revealed critical gaps in detecting advanced attacks, which bypassed the out-of-the-box detections. Your Azure environment proved to be containing several misconfigurations, which led to a comprehensive breach.

In this workshop we will explain several common misconfigurations that can lead to a severe compromise. We'll provide access to an environment which has some of these misconfigurations applied. You will simulate a successful device code phishing attempt after which you will collect data with AzureHound which data we will use to find possible attack paths. We will teach you how to find some of these misconfigurations and how to detect or remediate them.

The lab will have 1 challenge in there that will award a prize to the first to successfully exploit it.

Requirements:
Non corporate laptop with internet access
Docker installed, ideally with a working BloodHound installation.
Speakers
avatar for Henri Hambartsumyan

Henri Hambartsumyan

Henri Hambartsumyan is an experienced technical security professional, with 10 years of technical security experience. Henri started his career as pentester and moved to the more advanced pentesting projects. Later he started executing "covert operations", which the industry later... Read More →
avatar for Olaf Hartong

Olaf Hartong

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation... Read More →
Friday February 7, 2025 1:00pm - 3:00pm MST
Mattie Silks

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link