Security by Design
Facebook X LinkedIn

Security by Design

Combined Session
Thursday, May 11, 2023 17:30—18:30
Location: A 03-04

The Art of Privilege Escalation - How Hackers Become Admins

Privilege escalation is also one of the most common techniques attackers use to discover and exfiltrate sensitive valuable data. From a hacker’s perspective, privilege escalation is the art of increasing privileges from the initial access, which is typically that of a standard user or application account, all the way up to administrator, root, or even full system access. With NT AuthoritySystem access or on Linux the root account, attackers have full access to one system. With Domain Administrator access, they own the entire network.

• Top Methods of Privilege Escalation on Windows and Linux
• Common Tools used to identify Privilege Escalation
• And more...

The Art of Privilege Escalation - How Hackers Become Admins
Event Recording
The Art of Privilege Escalation - How Hackers Become Admins
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
The Art of Privilege Escalation - How Hackers Become Admins
Presentation deck
The Art of Privilege Escalation - How Hackers Become Admins
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Joseph Carson
Joseph Carson
Delinea
Joseph Carson is an award-winning cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specialising in blockchain, endpoint security,...

Defending Cross-Device flows against Illicit Consent Grant Attacks

Cross device flows lets a user initiate an action on one device (e.g. a SmartTV) and authenticate or authorize that action on a trusted personal device (e.g. a mobile phone). Examples includes authorizing a smart TV to access streaming content, or authenticating to a service by scanning a QR code with a mobile phone and completing the authentication on the mobile phone. This process of authorizing an action on a separate (but trusted) device from the one on which an action is initiated is an increasingly common flow, whether used for devices with limited input capabilities, multi-factor authentication or credential presentation. A number of standards have adopted this pattern including Device Authorization Grant (formerly Device Code Flow), Client Initiated Backchannel Authentication (CIBA) and Self Issued OpenID Provider (SIOP). These flows solve important business problems, but is vulnerable to attacks where the user is tricked into granting consent to an attacker. The IETF OAuth working group has recognised this challenge and is creating new guidance that leverages zero-trust principles to defend against these "illicit consent grant" attacks. This session will discuss the attacks and how the new guidance can mitigate these threats against cross device flows.

Defending Cross-Device flows against Illicit Consent Grant Attacks
Event Recording
Defending Cross-Device flows against Illicit Consent Grant Attacks
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Defending Cross-Device flows against Illicit Consent Grant Attacks
Presentation deck
Defending Cross-Device flows against Illicit Consent Grant Attacks
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Pieter Kasselman
Pieter Kasselman
Microsoft
Pieter Kasselman is a member of Microsoft's Identity Standards team where he focus on developing standards to address the most important problems in the field of identity. Pieter has over 25 years'...

Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior

A digital twin is a virtual representation of a real-life subject. This mapping encompasses its entire lifecycle, is updated from real-time data, and uses simulation, machine learning, and reasoning to support decision-making.

Human beings and their behavior can also be copied and simulated by digital twins. During the last talk at the EIC conference, we already looked at the threats, challenges and opportunities creating digital twins in cybersecurity.
This time we want to discuss how we can dive into a world through a digital twin of a cybercriminal to change perspectives and to understand the cybercriminals behavior.
Imagine having a tool that can perform these simulations at the highest level. Why not use it to our own advantage?
A digital twin that not only simulates the approach and behavioral patterns of cyber criminals but can also predict ahead of time. What if we can turn the tables on cybercriminals by fighting fire with fire?

Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
Event Recording
Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
Presentation deck
Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Silvia Knittl
Dr. Silvia Knittl
PwC GmbH WPG
Dr. Silvia Knittl is Director at PwC Germany in the Cyber & Privacy domain with a strong focus on  Enterprise Security Architecture as well as Identity & Access Governance. She...
Subscribe for updates
Please provide your email address