Powered by
Cyber
Security
Day
October 17, 2024
Join Us for CyberSecurity Day: Strengthen Your Digital Defenses
Prepare to elevate your cybersecurity knowledge at CyberSecurity Day on 17th October, where industry experts will dive deep into the latest threats and defenses. This event is your chance to learn practical, cutting-edge strategies to protect your organization from evolving cyber threats. The event is most beneficial for CIOs, IT directors and managers, IT security managers and anyone interested in CyberSecurity.
Get insights on:
- Infiltration Tactics: Discover how attackers exploit home routers with simple commands, compromising entire networks with ease.
- Active Directory Security: Learn about insidious persistence methods and how to outsmart attackers trying to hide within your systems.
- Encryption Vulnerabilities: Witness a real-time demonstration of how BitLocker, even with TPM, can be compromised without a PIN.
Stay ahead of cyber threats and fortify your security posture with actionable knowledge from top cybersecurity professionals.
CyberSecurity sessions brought to you by the LLPA network
Where SHELL you go, and with whom…
By WILLIAM ISCHANOE
We’ll show how attackers easily infiltrated our entire household through home routers with just a few simple characters. We don’t download anything on our PC, we don’t click on anything—just load a webpage, and our new and supposedly secure router surrenders its SHELL to the net. We’ll practically explain the connection between Command execution, named pipes, Shell, pivoting, and how attackers used this cocktail to navigate through our homes.
Insidious Persistence in Active Directory
By LUBOMÍR OŠMERA
The attacker has successfully gained initial access to the environment and is even lucky enough to obtain a privileged identity. But time is against him! He has only seconds left before detection components discover him, thwart his efforts, and permanently close the doors to the company. He must find a reliable way to hide and persist in the environment until he’s ready to take his next step or complete his plan. The dice are cast! The hide-and-seek game between attacker and defender begins. Let’s explore some insidious persistence methods an attacker might use against your Active Directory because those who are prepared won’t be caught off guard.
BitLocker plus TPM minus PIN
By ONDŘEJ ŠEVEČEK
How much (non)sense does it make to operate BitLocker encryption on system partitions with keys stored in TPM, without requiring a PIN at startup? We’ll demonstrate a real offline attack on a computer that still has both TPM and an encrypted disk.
Speakers
WILLIAM ISCHANOE
Expert Consultant and Instructor. He enjoys delving into anything that someone forgot to encrypt, Windows components from a security perspective, authentication, PKI, IPSec, and WiFi.
Certifications
MCSE, MCSA, MCT, MCTS, MCITP, CEI, CEH, ECSA
LUBOMÍR OŠMERA
Instructor, consultant, and architect in Microsoft technologies. His primary focus is on the security of the Microsoft ecosystem (both cloud and on-premises). He implements security technologies for both small companies and international corporations.
Certifications
MCSE, MCT, CEH, CND
ONDŘEJ ŠEVEČEK
Expert Consultant and Instructor. Specializes in Microsoft technologies with a focus on security, authentication and identity management, cryptography, PKI, and forensic investigations in enterprise environments. He programs in C++, C#, JavaScript, and PowerShell.
Certifications
CISA, MCSM, CEH, CHFI