Focus Areas:
🔒 Data Privacy & Protection
, 📦 Software Supply Chain Security
, 🔐 Application Security
, 🌐 Network Security
, 🎯 Penetration Testing
, 🏗️ Security Architecture
, 📚 Security Awareness
, 🔍 Vulnerability Management
Presentation Material
Abstract
AI Generated Summary
This research investigated attack methodologies targeting enterprise internet-facing assets through compromised vendor relationships. Attackers utilized a whitelist approach, focusing on specific vendor products (e.g., Microsoft servers, application servers) and their associated human and machine assets within client environments. Initial reconnaissance involved banner grabbing and harvesting data from public sources such as PDF user manuals and JavaScript files to identify technical leads and support personnel for social engineering.
Key findings revealed a high prevalence of IBM-based products among targeted vendors, enabling the crafting of
Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview — always refer to the original talk for authoritative content. Learn more about our AI experiments.