Privilege Escalation Deconstructed: Attacks and How to Stop Them

Поделиться
HTML-код
  • Опубликовано: 19 сен 2024
  • Discover how IAM Privilege Escalation attacks work and how threat actors commonly exploit misconfigurations. This session will explain what privilege escalations are, go through a live environment escalating privilege, and discuss common techniques used in the wild. We'll then explain and demonstrate how to find potential PrivEsc paths in the cloud to prevent and detect ongoing attacks.
    Presented by:
    Christophe Limpalair, Founder & Trainer, Cybr

Комментарии •