Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tunnel Vision: Exploring VPN Post-Exploitation Techniques

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This talk explores VPN post-exploitation techniques that attackers can use after compromising a VPN server. Learn how attackers can leverage control of VPN servers beyond just gaining network entry, focusing specifically on Ivanti Connect Secure and Fortigate systems. Discover methods attackers use to collect credentials, move laterally within networks, and maintain persistent access after initial compromise. Senior Security Researcher Ori David from Akamai demonstrates these techniques and concludes with essential best practices for security teams to mitigate these risks. Gain valuable insights into this critical security area that goes beyond the typical "patch and move on" approach to VPN vulnerabilities.

Syllabus

Tunnel Vision: Exploring VPN Post-Exploitation Techniques

Taught by

Black Hat

Reviews

Start your review of Tunnel Vision: Exploring VPN Post-Exploitation Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.