如需獲得最佳網頁瀏覽體驗,請使用 IE 11 或更高版本、Chrome、Firefox 或 Safari。

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
录播
  • 记录日期:Nov. 17, 2020
  • 活动:录播
Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.

观看免费网络直播

请稍候……

triangle-down check
进行下载即表示您注册以接收我们发送的营销电子邮件。要选择不再接收,请按照我们隐私政策中描述的步骤进行操作。

reCAPTCHA为此站点提供保护。请查看Google的隐私政策使用条款