Webinar • Brightalk: Akamai Security and Performance Insights

Tunnel Vision: Exploring VPN Post-Exploitation TechniquesAgéndalo en tu calendario habitual ¡en tu horario!

Jueves, 26 de septiembre de 2024, de 09.00 a 10.00 hs Horario de Ohio (US)
Webinar en inglés

We have all heard this story before - a critical vulnerability is discovered in a VPN server. It's exploited in the wild. Administrators rush to patch. Panic spreads across Twitter. Attackers have long sought to exploit VPN servers - they are accessible from the internet, expose a rich attack surface, and often lack in security and monitoring. Historically, VPNs were primarily abused to achieve a single objective: gaining entry into internal victim networks. While this is evidently very valuable, control over a VPN server shouldn't solely be seen as a gateway to the network, and can certainly be abused in various other ways. In this talk, we will explore VPN post-exploitation - a new approach that consists of different techniques attackers can employ on the compromised VPN server to further progress their intrusion. To demonstrate this concept, we will inspect two of the most common VPN servers on the market - Ivanti Connect Secure and Fortigate, and show how an attacker with control over them can collect user credentials, move laterally, and maintain persistent access to the network. We will conclude by detailing best practices and principles that should be followed by security teams when using VPN servers to reduce the risk from post-exploitation techniques. During the session, you will: - Explore critical vulnerabilities and real-world exploits on popular VPN platforms. - Discover post-exploitation tactics for credential collection, lateral movement, and persistent access. - Learn best practices to enhance VPN security and reduce advanced threat risks.

¿Le gustaría hacer webinars o eventos online con nosotros?
Sponsors
No hay sponsors para este webinar.


Cerrar