Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This talk explores VPN post-exploitation techniques that attackers can use after compromising a VPN server. Learn how attackers can leverage control of VPN servers beyond just gaining network entry, focusing specifically on Ivanti Connect Secure and Fortigate systems. Discover methods attackers use to collect credentials, move laterally within networks, and maintain persistent access after initial compromise. Senior Security Researcher Ori David from Akamai demonstrates these techniques and concludes with essential best practices for security teams to mitigate these risks. Gain valuable insights into this critical security area that goes beyond the typical "patch and move on" approach to VPN vulnerabilities.