♫musicjinni

13 - BruCON 0x0A - All Your Cloud Are Belong To Us – Hunting Compromise in Azure - Nate Warfield

video thumbnail
MongoDB, Redis, Elastic, Hadoop, SMBv1, IIS6.0, Samba. What do they all have in common? Thousands of them were pwned. In Azure. In 2017.

Attackers have shifted tactics, incorporated nation-state leaked tools and are leveraging ransomware to monetize their attacks. Cloud networks are prime targets; the DMZ is gone, the firewall doesn't exist and customers may not realize they've exposed insecure services to the Internet until it's too late.

In this talk I'll discuss hunting, finding and remediating compromised customer systems in Azure - a non-trivial task with 1.59million exposed hosts and counting. Remediating system compromise is only the first stage so we'll also cover how we applied the lessons learned to proactively secure Azure Marketplace.

Finally, I will present research I've done into the default security configuration of Azure & AWS Marketplace images and present a call to action for teams working on Azure security offerings

04 - BruCON 0x0F - Attack Surface and Security Implications of eSIM Technology - Markus Vervier

BruCON 0x09 - How hackers changed the security industry - Chris Wysopal

Simple reversing challenge and gaming the system - BruCON CTF part 1

01 - BruCON 0x0A - BruCON Retro Opening

BruCON Promotional Video 2015

04 - BruCON 0x0D - eCos Offensive Security Research Logbook - Quentin Kaiser

BruCON 0x07 Aftermovie

03 - BruCON 0x0B - Security transition from 4G to 5G are we secure enough? - Altaf Shaik and Ravisha

08 - BruCON 0x0F - Keynote: Robot vs Robot - Mikko Hypponen

22 - BruCON 0x0A - Using blue team techniques in red team ops - Mark Bergman & Marc Smeets

BruCON 0x07 - Brain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez

06 - BruCON 0x0E - 0wn-premises: Bypassing Microsoft Defender for Identity - Nikhil Mittal

BruCON 0x08 – Virtual Terminals, POS Security And Becoming A... – Grigorios Fragkos

03 - BruCON 0x0D - Automating Binary Analysis with Ghidra's P-Code - Gergely Revay

05-BruCON 0x0E -A Black-Box Security Evaluation of the SpaceX Starlink User Terminal-Lennert Wouters

06 - BruCON 0x0B - Human side-channels and their implications for security and privacy

BruCON 0x08 - Security Through Design - Jelle Niemantsverdriet

BruCON 0x09 - Open Soure Security Orchestration - Gregory Pickett

BruCON 0x07 - Shims For The Win - Willi Ballenthin & Jon Tomczak

Cegeka is XL Diamond sponsor at BruCON 2023 | 10 security colleagues joined the security conference

06 - BruCON 0x0F - Red Team Tales: 7 Years of Physical Penetration Testing - Justin Wynn

BruCON 0x06 - Keynote - Adam Shostack

Brucon 2010: Memoirs of a Data Security Street Fighter 5/5

BruCON 0x06 - Security model bedfellows - Noel Dunne & Paco Hope

05 - BruCON 0x0A - Levelling Up Security @ Riot Games - Mark Hillick

BruCON 0x08 - What Does The Perfect Door Or Padlock Look Like? - Deviant Ollam

Cédric at BruCON 2023 | 2-days Cybersecurity Conference in Mechelen

BruCON 0x08 – New Adventures In Active Defense, Offensive… - John Strand

BruCON 0x07 - Nightmares of a Pentester - Chris Nickerson

06 - BruCON 0x0A - Social engineering for penetration testers - Sharon Conheady

Disclaimer DMCA