We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Hacking in 2016 - How is our systems broken?

Formal Metadata

Title
Hacking in 2016 - How is our systems broken?
Title of Series
Number of Parts
96
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
From zero to to hero - Total domination. In this presentation, Chris Dale shows how a typical network is compromised through multiple levels of exploitation. The talk is very demo intensive and hands on, proving how an attacker with extremely limited access to an organization is still able to get a foothold, even with no apparent vulnerabilities present. Once a foothold is gained, the attack surface increases. The attacker uses the increased attack surface to compromise further into the organisation, eventually gaining all the keys to the kingdom. If you are curious on how a hacker accomplishes their goals, how they work and the attacks that take place, this hs the talk for you.