πŸ§ͺ Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

πŸͺͺ Identity & Access Management

Identity management and access control

58
Contributors
48
Talks
10
Tool Demos
3
Panels
2
Awards

Top Contributors

Nikhil Mittal(6) Gursev Singh Kalra(3) Prashant Mahajan(3) Rohan Durve(3) Ajit Hatti(2)

Related Tags (12)

Show all 12 tags...

All Entries (63 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-08-07Tool demoBlackhat AzDevRecon - Azure DevOps Enumeration Tool Source Code Raunak Parmar#azure#devsecops#iam
2025-06-02TalkConfidence Adversarial Phishing: Defeating Security Barriers and AI-Driven Countermeasures Video Himanshu Sharma, Rahul Vashista#phishing#red-teaming#mfa+1
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigam#post-exploitation#lateral-movement#identity-management
2024-12-11Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#network-forensics+1
2024-11-21TalkSecurityfest UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities Video Priyank Nigam#web-security#appsec#iam
2024-11-16TalkC0c0n Active Directory Deception Strategies Madhukar Raina, Sayan Mitra#active-directory
2024-10-23TalkBlackhat Guardians of the OAuth Galaxy: Defending Your Organization from OAuth Application Attacks Presentation Video Shruti Ranjit, Mangatas Tondang#blueteam#oauth#application-pentesting+4
2024-09-20Talk44con Unveiling the ghosts of mobile networks: When will old bugs die? Video Altaf Shaik#5g#authentication#encryption+3
2024-08-08Tool demoBlackhat Active Directory Cyber Deception using Huginn Source Code Rohan Durve, Paul Laine#active-directory#incident-management#identity-governance+3
2024-04-18TalkBlackhat Breaking Managed Identity Barriers In Azure Services Presentation Nitesh Surana, David Fiser#azure#cloud-pentesting#access-management+3
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2023-08-11Tool demoDefcon vAPI : Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#owasp#authorization
2023-08-10Tool demoBlackhat vAPI: Vulnerable Adversely Programmed Interface Source Code Tushar Kulkarni#api-security#authorization#security-testing+3
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathews#authentication#data-protection#embedded-security
2023-06-01TalkSecurityfest Beyond On-Premises: Exploring the Post-Domain Admin Landscape in the Cloud Video Sriraam Natarajan, Venkatraman Kumar#red-teaming#azure#active-directory+2
2023-05-12TalkBlackhat Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators Video Sravan Akkaram, Nestori Syynimaa#azure#identity-governance#access-management+1
2023-05-12Tool demoBlackhat GCPGoat : A Damn Vulnerable GCP Infrastructure Source Code Shantanu Kale, Rishappreet Singh Moonga, Ravi Verma, Govind Krishna#gcp#cloud-pentesting#cloud-workload-protection+4
2022-09-29TalkBrucon 0wn-premises: Bypassing Microsoft Defender for Identity Video Nikhil Mittal#red-teaming#active-directory#threat-detection
2022-09-24TalkC0c0n Know Your Organization? : Mapping Entities in Google Workspace Manish Gupta, Yash Bharadwaj#gcp#identity-management#access-management+1
2022-09-06PanelNullcon PAM Maturity From Zero Trust To Least Privilege Video Ajay Bongirwar, Charanjit Bhatia, Bala Ramanan#security-strategy#zero-trust#access-management+2
2022-08-10TalkBlackhat Attacks From a New Front Door in 4G & 5G Mobile Networks Presentation Video Altaf Shaik, Shinjo Park, Matteo Strada#api-security#access-management#identity-theft+4
2022-04-08PanelNullcon Digital Identity In The Age Of Fintech Video Sheetal Joseph, Alessandro Avagliano, Guido Reismueller, Benoit Flippen, Travis Carelock#identity-management#access-management#authentication+4
2021-11-13TalkC0c0n Enhancing An Multi-Factor Authentication (MFA) through Behavioural Biometrics Kiran Kumar Pg#authentication#mfa#architecture
2021-11-13TalkC0c0n Exploiting 2A(Authentication and Authorization) Vulnerabilities of Web Application Gayatri Nayak#web-security#authentication#authorization+2
2021-11-04TalkEkoparty DIAL: Did I just alert Lambda? A centralized security misconfiguration detection system Source Code Video Saransh Rana, Divyanshu Mehta, Harsh Varagiya#aws#security-monitoring#iam+1
2020-09-18TalkC0c0n Broken Cryptography & Account Takeover Harsh Bothra#encryption#ssl#security-testing+2
2020-08-07PanelDefcon D0 N0 H4RM: A Healthcare Security Conversation Video Vidha Murthy, Christian Dameff, Jeff Tully, Jessica Wilkerson, Veronica Schmitt, Ash Luft#data-protection#identity-management#security-training+3
2020-08-06Tool demoBlackhat Dynamic Labs: Windows & Active Directory Exploitation Source Code Rohan Durve#windows#active-directory#security-training
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-09-28TalkRomhack Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Presentation Video Samit Anwer#oauth#phishing#csrf+2
2019-09-27TalkC0c0n Stepping into Password Less Economy Ajit Hatti#authentication#identity-management#secure-development+1
2019-09-23TalkRootcon Identity crisis: war stories from authentication failures Presentation Video Vishal Chauhan#authentication#identity-management#vulnerability-assessment+3
2019-08-10TalkDefcon RACE - Minimal Rights and ACE for Active Directory Dominance Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2019-08-08TalkBlackhat Preventing Authentication Bypass: A Tale of Two Researchers Presentation Ravi Jaiswal, Terry Zhang, Ron Chan#security-development-lifecycle#identity-management#authentication+4
2019-05-28TalkSecurityfest Oh! Auth: Implementation pitfalls of OAuth 2.0 & the Auth Providers who have fell in it Video Samit Anwer#web-security#iam#appsec
2018-10-10TalkBrucon Forging Trusts for Deception in Active Directory Video Nikhil Mittal#windows#active-directory#red-teaming
2018-10-04TalkConfidence Hacking 50 Million users using 123456 Aman Sachdev, Himanshu Sharma#web-security#authentication#ethical-hacking+2
2018-08-12TalkDefcon Last mile authentication problem: Exploiting the missing link in end-to-end secure communication Presentation Video Siddharth Rao, Thanh Bui#encryption#authentication#ipc+1
2018-08-11Tool demoDefcon ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-08-09TalkBlackhat Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key Presentation Whitepaper Video Sanchari Das, Andrew C Dingman, Gianpaolo Russo, L Jean Camp#two-factor-authentication
2018-08-08Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2018-05-30TalkAuscert How to Bypass Authentication & Authorization Presentation Sarwar Jahan#authentication#authorization#web-security+1
2018-03-22Tool demoBlackhat ADRecon: Active Directory Recon Presentation Source Code Prashant Mahajan#active-directory#windows#reconnaissance+1
2017-09-13Talk44con Red Team Revenge : Attacking Microsoft ATA Presentation Video Nikhil Mittal#windows#red-teaming#active-directory+4
2017-08-19TalkC0c0n Trust, the foundation of Digital Mastery Sunil Varkey#identity-management#authentication#risk-management+2
2017-07-27TalkBlackhat Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#security-assessment+1
2017-04-19TalkBrucon Evading Microsoft ATA for Active Directory Domination Presentation Video Nikhil Mittal#active-directory#red-teaming#windows
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2016-08-19TalkC0c0n Kill the password - A new era of authentication Tamaghna Basu#authentication#iam#architecture+1
2015-11-05TalkGroundzerosummit Authentication flaw in Automatic Bank Passbook printing machine. Indrajeet Bhuyan#authentication#identity-management#application-pentesting+3
2015-10-25TalkToorcon PixelCAPTCHA – A Unicode Based CAPTCHA Scheme Gursev Singh Kalra#web-security#authentication#bypassing
2015-01-27TalkOwaspappseccalifornia The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers Video Devdatta Akhawe#web-security#xss#csrf+2
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon o’Dea Assertions - Untwining the Security of the SAML Protocol Video Achin Kulshrestha#authentication#saml#sso+2
2013-03-01TalkNullcon Inception of graphical passwords Video Rishi Narang#authentication#application-pentesting#secure-development+3
2012-09-26TalkNullcon How secure is internet banking in India Video Ajit Hatti#web-security#authentication#financial-institutions+1
2012-03-15TalkGrrcon SCADA Security: Why is it so hard? Video Amol Sarwate#scada#ics-security#authentication+2
2012-03-02Award CAPTCHA Re-Riding Attack Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2011-11-17Award CAPTCHA Hax With TesserCap Source Code Gursev Singh Kalra#web-security#bypassing#authentication
2011-10-07TalkC0c0n Password Less Authentication, Authorization Whitepaper Srikar Sagi#authentication#authorization#iam
2011-02-25TalkNullcon Protect infrastructure or protect information – Lessons from Wikileaks Presentation Vishal Gupta#data-leak#blueteam#data-protection+2
2009-12-04TalkClubhack Facilitate Collaboration with Information Rights Management Abhijit Tannu#information-rights-management#data-protection#application-hardening+4