
Format:
Technology lecture
Language:
German
A company's attack surface no longer ends at the firewall. Modern attackers combine both worlds – technical and human vulnerabilities – to create real attack paths. Open systems, faulty configurations, forgotten services, and exposed cloud resources are only one side of the attack surface. The other side concerns the human factor: leaked access data, misused identities in social engineering campaigns, or uncontrolled shadow IT create additional risks.
In this presentation, we will show in a practical way how global Internet scans and darknet leaks can be systematically used to reveal these hidden attack surfaces. You will gain insight into how professional red teams and attackers structure, prioritize, and automate their reconnaissance phases. Real-life examples will illustrate ho ...
