Compilation of Conference talks and details
Talk: User Enumeration Via Correlated Response Analysis Against Office365
A new and novel Office365 user enumeration technique against Federated environments. Valid/Invalid user responses aren't standard, so dynamic analysis of indicators can be used to determine a baseline for each organization. This baseline can then be used to enumerate users.
Talk: BloodHound Use and Abuse
Bloodhound is a popular open-source Active Directory security tool that can be used for both offensive and defensive security. The goal of this talk was an intro-to-intermediate breakdown of what Bloodhound is, how it can be used in your organization, and any open source tools that can be used to maximize its efficiency.