πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Lateral Movement

Focus Area: 🎯 Penetration Testing
11
Total Entries
12
Contributors

Top Contributors

Bharadwaj Machiraju(3) Francis Alexander(2) Abhay Bhargav(1) Akib Sayyed(1) Anand Tiwari(1)

All Entries (11 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-13TalkInsomnihack Beyond LSASS: Cutting-Edge Techniques for Undetectable Threat Emulation Video Priyank Nigam#post-exploitation#lateral-movement#identity-management
2024-12-12Tool demoBlackhat Cloud Offensive Breach and Risk Assessment (COBRA) Source Code Harsha Koushik, Anand Tiwari#cloud-pentesting#cloud-workload-protection#security-testing+3
2023-12-06Tool demoBlackhat Docker Exploitation Framework Source Code Rohit Pitke, Emmanuel Law#exploitation#container-security#docker+4
2023-09-28TalkRootcon Azure Illuminati: Unveiling the Mysteries of Cloud Exploitation Video Raunak Parmar#azure#cloud-pentesting#mfa+4
2021-11-13TalkC0c0n Light Basin - Telecom roaming network attack case study Video Akib Sayyed#network-pentesting#network-traffic-analysis#gtp+2
2021-10-13Tool demoRootcon Buzzard : Crafting your post exploitation framework against odds Presentation Aravindha Hariharan, Subhajeet Singha#security-assessment#post-exploitation#privilege-escalation+2
2019-09-13TalkGlobalappsec A Purple Team View of Serverless and GraphQL Applications Abhay Bhargav#purpleteam#cloud-workload-protection#serverless+3
2017-03-24TalkInsomnihack How we hacked Distributed Configuration Management Systems Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Bharadwaj Machiraju, Francis Alexander#security-assessment#application-pentesting#vulnerability-assessment+4
2017-03-23TalkTroopers How we hacked Distributed Configuration Management Systems Video Francis Alexander, Bharadwaj Machiraju#security-assessment#application-pentesting#vulnerability-assessment+4
2015-08-08TalkDefcon Powershell for Penetraton Testers Video Nikhil Mittal#security-assessment#red-teaming#exploitation+3