Attackers Follow Security Principles Too

1:08:40
Synced User Attack Path Analysis with BloodHound

53:35
SmartBrief - Offense on Defense: Securing Hybrid Identity with Attack Paths

1:00:28
Putting NTLM in the Doghouse

32:15
Taking the "B" Out of DBA - An Attack Path Against AD FS Through Database Admin... | SO-CON 2025

48:50
Cracking the Identity Perimeter: Towards a Unified Access Control Model | SO-CON 2025

42:16
There and Back Again: An Attacker's Tale of DCs in AWS | SO-CON 2025

48:37
Hunting SMB Shares with Data, Graphs, Charts, and LLMs | SO-CON 2025

37:58