Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This talk explores VPN post-exploitation techniques that attackers can use after compromising a VPN server. Learn how attackers can leverage control of VPN servers beyond just gaining network entry, focusing specifically on Ivanti Connect Secure and Fortigate systems. Discover methods attackers use to collect credentials, move laterally within networks, and maintain persistent access after initial compromise. Senior Security Researcher Ori David from Akamai demonstrates these techniques and concludes with essential best practices for security teams to mitigate these risks. Gain valuable insights into this critical security area that goes beyond the typical "patch and move on" approach to VPN vulnerabilities.