Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that
Read More05-02
What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that
Read MoreIn this talk, we will introduce the security implications of HTTP/2 server push and signed HTTP exchange (SXG) on the
Read MoreSupply chain compromises like the 2020 SolarWinds breach have shown how devastating and stealthy these attacks can be. Despite advances
Read MoreThe macOS threat landscape has changed considerably in recent years with the ever-increasing prevalence of macOS malware. In response, Apple
Read MoreApple’s on device AI frameworks CoreML, Vision, AVFoundation enable powerful automation and advanced media processing. However, these same capabilities introduce
Read MoreHigh-entropy ASLR was supposed to make bypasses of ASLR on Windows virtually impossible – until now! This talk will debut
Read MoreNetwork Attached Storage (NAS) devices are indispensable in many corporate and home environments. These devices often live on the network
Read MoreBrowser extensions have become increasingly popular for enhancing the web browsing experience. Common examples are ad blockers, cryptocurrency wallets, and
Read MoreJust Hacking Training livestream with Andrew Pla! Friday February 20th at 10am PT / 1pm ET. https://justhacking.com/John HammondRead More
Read MoreJoin Black Hat USA Review Board Members for a compelling discussion on the most pressing issues facing the InfoSec community
Read More