I thought I was secure... until I wasn't
This talk demonstrates how common security oversights, such as using default credentials and failing to update software, can lead to significant system compromises. The speaker illustrates how attackers leverage OSINT techniques, including reverse image searching and social media analysis, to gather intelligence on targets and gain unauthorized access. The presentation highlights the critical importance of robust security hygiene, such as using password managers, enabling multi-factor authentication, and securing remote access configurations. Practical examples are provided to show how easily exposed services can be exploited by malicious actors.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




