Lateral Movement & Privilege Escalation in GCP Compromise Organizations without Dropping an Implant

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=2dqj4FZxvEU



Duration: 40:53
3 views
0


Black Hat - USA - 2020
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-10Web Cache Entanglement Novel Pathways to Poisoning
2022-01-10Whispers Among the Stars A Practical Look at Perpetrating Satellite Eavesdropping Attacks
2022-01-10Kr00k Serious Vulnerability Affected Encryption of Billion Wi Fi Devices
2022-01-10Spectra Breaking Separation Between Wireless Chips
2022-01-10Reverse Engineering the Tesla Battery Management System to increase Power Available
2022-01-10You have No Idea Who Sent that Email 18 Attacks on Email Sender Authentication
2022-01-10Lamphone Real Time Passive Reconstruction of Speech Using Light Emitted from Lamps
2022-01-10Stealthily Access Your Android Phones Bypass the Bluetooth Authentication
2022-01-10Reversing the Root Identifying the Exploited Vulnerability in 0 days Used In The Wild
2022-01-10When Lightning Strikes Thrice Breaking Thunderbolt 3 Security
2022-01-10Lateral Movement & Privilege Escalation in GCP Compromise Organizations without Dropping an Implant
2022-01-10Stopping Snake Oil with Smaller Healthcare Providers Addressing Security with Actionable Plans
2022-01-10Room for Escape Scribbling Outside the Lines of Template Security
2022-01-10When TLS Hacks You
2022-01-10Stress Testing Democracy Election Integrity During A Global Pandemic
2022-01-10Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
2022-01-10Routopsy Modern Routing Protocol Vulnerability Analysis and Exploitation
2022-01-10Ruling StarCraft Game Spitefully Exploiting the Blind Spot of AI Powered Game Bots
2022-01-10All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate
2022-01-10Superman Powered by Kryptonite Turn the Adversarial Attack into Your Defense Weapon
2022-01-10Security Research on Mercedes Benz From Hardware to Car Control



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering