Security Congress Abstract
This live demo will follow, step by step, an attack on an organization’s network. We'll start by taking over a user’s desktop and connect it to our command-and-control center. We'll steal passwords and documents, grab screen and email content, install a keylogger, record sound and stream user video, control a mouse and keyboard, modify anti-malware settings, execute programs, reshape network traffic, and create a hidden persistent data exfiltration channel. We'll scrape login tokens and perform network recon, then "jump" to other computers as we bypass MFA and network segregation restrictions.
This interactive demo is executed live in a simulated but fully functional corporate environment. It incorporates detailed explanations on how each stage of the attack is performed, and what detective or preventative controls could have mitigated against it.