🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Identity & Access Management

Identity management and access control

31
Total Entries
28
Contributors
48
Unique Tags
34
Related Tags

Top Contributors

Nikhil Mittal(5) Prashant Mahajan(3) Rohan Durve(3) Achin Kulshrestha(1) Ajit Hatti(1)

Related Tags (11)

Show all 11 tags...

All Entries (31 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmarazuredevsecopsiam+1
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durveactive-directory
2024-11-16TalkC0c0n Active Directory Deception Strategies Madhukar Raina, Sayan Mitraactive-directory
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durveactive-directory
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Ranacicd-securitydevsecopsvulnerability-management+6
2023-08-11Tool demoDefcon vAPI : Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarniapi-securityowaspauthorization+1
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittalred-teamingactive-directorythreat-detection
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwajgcpidentity-managementaccess-management+2
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pgauthenticationmfasecurity-architecture
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayakweb-securityauthenticationauthorization+2
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiyaawssecurity-monitoringiam+2
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durvewindowsactive-directory
2019-09-28TalkROM Hack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anweroauth
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hattiauthenticationidentity-managementsecure-development+1
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhanauthenticationidentity-managementvulnerability-assessment+3
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittalactive-directoryredteamwindows
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittalwindowsactive-directoryredteam
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Raocryptographywebauthentication+2
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-08-09TalkBlackhat Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key Presentation Whitepaper Video Sanchari Dastwo-fator-authentication
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajanactive-directorywindowsreconnaissance+1
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkeyidentity-managementauthenticationrisk-management+2
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteampentest+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittalactive-directoryredteamwindows
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basuauthenticationiamsecurity-architecture+1
2015-01-27TalkOwasp App Sec California The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhaweweb-securityxsscsrf+3
2014-02-14TalkNullcon o’Dea Assertions - Untwining the Security of the SAML Protocol Video Achin Kulshresthaauthenticationwebbrowser+4
2013-03-01TalkNullcon Inception of graphical passwords Video Rishi Naranginfrastructureauthentication
2011-10-07TalkC0c0n Password Less Authentication, Authorization Whitepaper Srikar Sagiauthenticationauthorizationiam