Reinventing Access Control: Fingerprinting for Creds Protection | Tech Talk by Aditya | VULNCON 2025
Автор: VULNCON
Загружено: 2025-12-11
Просмотров: 103
Описание:
In this technical talk, Aditya Singh breaks down “Reinventing Access Control: Fingerprinting for Credential Protection”—a cutting-edge approach to stopping credential theft in an era where identity is the new attack surface. Aditya unpacks how browser, network, and hardware-level fingerprinting can accurately identify users across devices and platforms, offering organizations a powerful line of defense against spoofing, session hijacking, and unauthorized access.
Speaker:
Aditya Singh
Cybersecurity Analyst, Turtleneck Systems & Solutions | Independent Security Researcher
Aditya has worked as a Research Intern at IIT Bombay, building a Mobile Device Fingerprinting module for Suricata, and as a Threat Analyst at NTRO. With experience across threat research and defensive security, he has spoken at major conferences including Delhi Defcon, BlackHat, Nullcon, and BSides, contributing impactful research to the security community.
LinkedIn: / aditya-singh---
Key Highlights:
The evolution of device fingerprinting in modern access control
Browser, network, and hardware artifacts used to build unique user identities
Preventing credential misuse through granular verification
Strengthening organizational security against spoofing and identity-based attacks
Follow Us,
LinkedIn: / vulncon
X: / vulncon
Instagram: / vulncon
0:08 - Introduction to access control
1:04 - What is digital fingerprinting?
2:44 - Types of fingerprints explained
3:29 - Browser fingerprinting characteristics
5:51 - Browser differences in web audio APIs
7:25 - Introduction to canvas fingerprinting
8:40 - Generating unique identifiers with favicons
10:40 - Clearing site data and cookies process
12:16 - Favicon retrieval process explained
14:32 - Introduction to device fingerprinting
15:55 - GPU fingerprinting using WebGL API
17:20 - Overview of math fingerprinting techniques
18:19 - Creating mathematical fingerprints
19:05 - Introduction to TLS fingerprinting
20:10 - Identifying anomalies with fingerprints
21:09 - CPU fingerprinting techniques explained
24:17 - Hardware aging and its implications
25:10 - Integrating fingerprinting into access controls
26:01 - Continuous session verification explained
27:20 - Privacy concerns with fingerprinting techniques
#vulncon2025 #cybersecurity #digitalindia #infosec #techtalk #accesscontrol #fingerprinting #dataprotection
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: