Getting Inside the Mind of an Attacker: Going Beyond the Exploitation of Software Vulnerabilities

When evaluating potential risks to an organization, the human factor is one of most dynamic and crucial elements to consider. An attacker can take advantage of security pitfalls introduced by humans, gaining access and even escalating privileges. Anyone from a regular user to an IT admin can make simple but critical errors that allow a threat actor to enter your organization’s network.

In this webinar, dive deep into the rationale behind such attacks and find out how a threat actor can take advantage of weaknesses found in software, configuration, and identity. Using three different attack scenarios that pen testers on the Core Security SCS team discovered and exploited in the field, cybersecurity expert Julio Sanchez demonstrates how a real attack chain is opportunistically created based on initial findings. Learn about weaknesses such as firewall filtering rules or abusing Kerberos tickets, and how to ensure you have a strong security program that can manage such identity attacks.

Media Video

Continue to Get Inside the Mind of an Attacker

Check out part one of the Getting Inside the Mind of an Attacker series: TLS Attacks and Pitfalls.