ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Reinventing Access Control: Fingerprinting for Creds Protection | Tech Talk by Aditya | VULNCON 2025

Автор: VULNCON

Загружено: 2025-12-11

Просмотров: 103

Описание: In this technical talk, Aditya Singh breaks down “Reinventing Access Control: Fingerprinting for Credential Protection”—a cutting-edge approach to stopping credential theft in an era where identity is the new attack surface. Aditya unpacks how browser, network, and hardware-level fingerprinting can accurately identify users across devices and platforms, offering organizations a powerful line of defense against spoofing, session hijacking, and unauthorized access.

Speaker:
Aditya Singh
Cybersecurity Analyst, Turtleneck Systems & Solutions | Independent Security Researcher
Aditya has worked as a Research Intern at IIT Bombay, building a Mobile Device Fingerprinting module for Suricata, and as a Threat Analyst at NTRO. With experience across threat research and defensive security, he has spoken at major conferences including Delhi Defcon, BlackHat, Nullcon, and BSides, contributing impactful research to the security community.
LinkedIn:   / aditya-singh---  

Key Highlights:
The evolution of device fingerprinting in modern access control
Browser, network, and hardware artifacts used to build unique user identities
Preventing credential misuse through granular verification
Strengthening organizational security against spoofing and identity-based attacks

Follow Us,
LinkedIn:   / vulncon  
X:   / vulncon  
Instagram:   / vulncon  

0:08 - Introduction to access control
1:04 - What is digital fingerprinting?
2:44 - Types of fingerprints explained
3:29 - Browser fingerprinting characteristics
5:51 - Browser differences in web audio APIs
7:25 - Introduction to canvas fingerprinting
8:40 - Generating unique identifiers with favicons
10:40 - Clearing site data and cookies process
12:16 - Favicon retrieval process explained
14:32 - Introduction to device fingerprinting
15:55 - GPU fingerprinting using WebGL API
17:20 - Overview of math fingerprinting techniques
18:19 - Creating mathematical fingerprints
19:05 - Introduction to TLS fingerprinting
20:10 - Identifying anomalies with fingerprints
21:09 - CPU fingerprinting techniques explained
24:17 - Hardware aging and its implications
25:10 - Integrating fingerprinting into access controls
26:01 - Continuous session verification explained
27:20 - Privacy concerns with fingerprinting techniques

#vulncon2025 #cybersecurity #digitalindia #infosec #techtalk #accesscontrol #fingerprinting #dataprotection

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Reinventing Access Control: Fingerprinting for Creds Protection | Tech Talk by Aditya | VULNCON 2025

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Hunting for uncommon bugs in Client Side Applications  | Youssef Sammouda | VULNCON 2021 | NOOB ARMY

Hunting for uncommon bugs in Client Side Applications | Youssef Sammouda | VULNCON 2021 | NOOB ARMY

Exposing the Unseen: Malware Hunting from the Dark Corners of Memory by Monappa KA | VULNCON 2025

Exposing the Unseen: Malware Hunting from the Dark Corners of Memory by Monappa KA | VULNCON 2025

The Soul of the Hacker | Keynote by Vicky Ray, Founder & CEO @ RayvenX | VULNCON 2025

The Soul of the Hacker | Keynote by Vicky Ray, Founder & CEO @ RayvenX | VULNCON 2025

Same 128GB but cheaper

Same 128GB but cheaper

Filtering Bad Ads Using LLM Assisted AdBlocking - Ritik Roongta

Filtering Bad Ads Using LLM Assisted AdBlocking - Ritik Roongta

Выживи 30 Дней Взаперти В Небе, Выиграй $250,000

Выживи 30 Дней Взаперти В Небе, Выиграй $250,000

Securing AI-Driven Enterprises: Challenges and Strategies | CXO Panel | VULNCON 2025

Securing AI-Driven Enterprises: Challenges and Strategies | CXO Panel | VULNCON 2025

КТО БОЛЬШЕ ДУРА? ЛУРЬЕ ИЛИ ДОЛИНА?

КТО БОЛЬШЕ ДУРА? ЛУРЬЕ ИЛИ ДОЛИНА?

Securing India’s Digital Future | CXO Panel | VULNCON 2025

Securing India’s Digital Future | CXO Panel | VULNCON 2025

These New NotebookLM Updates Are Insane! (Free New Features)

These New NotebookLM Updates Are Insane! (Free New Features)

ChatGPT Image 1.5 Just Made Editing WAY Easier

ChatGPT Image 1.5 Just Made Editing WAY Easier

Służby ujawniają prywatne informacje. Państwo traci wiarygodność | Salonik Polityczny Ziemkiewicza

Służby ujawniają prywatne informacje. Państwo traci wiarygodność | Salonik Polityczny Ziemkiewicza

Munich Quantum Software Forum 2025: Talk by Lukas Burgholzer (Munich Quantum Software Company)

Munich Quantum Software Forum 2025: Talk by Lukas Burgholzer (Munich Quantum Software Company)

Reinforcement Learning Tutorial - RLVR with NVIDIA & Unsloth

Reinforcement Learning Tutorial - RLVR with NVIDIA & Unsloth

ИИ для бизнеса — применение ИИ-помощника Nurai

ИИ для бизнеса — применение ИИ-помощника Nurai

Новое обновление Gemini + NotebookLM — это просто БЕЗУМИЕ!

Новое обновление Gemini + NotebookLM — это просто БЕЗУМИЕ!

Future of AI: Jobs at Risk, How to Use AI Tools, Skills That Make You Money & AI for Business💭💰

Future of AI: Jobs at Risk, How to Use AI Tools, Skills That Make You Money & AI for Business💭💰

PARTYJNY HAREM: 10 gwiazd PRL, które OBSŁUGIWAŁY partyjną elitę

PARTYJNY HAREM: 10 gwiazd PRL, które OBSŁUGIWAŁY partyjną elitę

WQC Fall 2025- Capital Asset Pricing Model

WQC Fall 2025- Capital Asset Pricing Model

Czesław Niemen poszedł za swoją sprzątaczką do domu... to, co odkrył, doprowadziło go do płaczu.

Czesław Niemen poszedł za swoją sprzątaczką do domu... to, co odkrył, doprowadziło go do płaczu.

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]