BSidesFrankfurt

36 Followers
2 Following
58 Posts
2025-08-28 BSidesFrankfurt Workshops
2025-08-29 BSidesFrankfurt Conference
https://www.bsidesfrankfurt.org
Big welcome to @offsec as our new SILVER Sponsor!
Home of OSCP and world-class offensive security training.
So glad to have you onboard!

Thrilled to announce @SI_FalconTeam as our new SILVER Sponsor!

Expert incident response, digital forensics & threat hunting specialists.

Welcome to the team, @SI_FalconTeam ! 🔥

https://www.secuinfra.com/

Cyber Defense - Made in Germany | SECUINFRA

SECUINFRA unterstützt Unternehmen bei der Erkennung, Analyse und Abwehr von Cyber Angriffen. Vor Ort und aus unserem Cyber Defense Center in Deutschland.

Secuinfra GmbH
Excited to announce Blaze Information Security as our new GOLD Sponsor!
CREST-accredited penetration testing pros delivering elite red teaming and offensive security services.
Welcome onboard, Blaze — let's make this event epic! 🔥
https://www.blazeinfosec.com/
CREST Penetration Testing Services Company | Blaze

Boutique penetration testing services company. We help organizations worldwide expose digital risks and defend against cyber threats. Talk to an expert today.

Blaze Information Security
🚨 Early Bird tickets for BSides Frankfurt 2026 drop this Wednesday (April 1)! Only 30 discounted tickets available. Community-driven infosec conference + workshops → Sept 10–11, 2026. Grab yours before they're gone → https://bsidesfrankfurt.org/
BSidesFrankfurt

Conference: Sept 10, 2026 | Workshops: Sept 11, 2026. Tickets on sale end of February. CFP is open now! www.bsidesfrankfurt.org

Evgen Blohm, Marius Genheimer - Living on the Edge: Evicting threat actors from perimeter appliances

This presentation will showcase highlights from our past forensic investigations into different compromised edge devices (primarily network equipment), manufactured by Cisco, Fortinet, Citrix and Ivanti. Analyzing these appliances is not as straight forward as on normal endpoints and sometimes requires a bit of creativity. I will include information on the utilized exploits, the targets and motivation of the nation-state or cybercriminal perpetrators and practical tips to investigate and protect these appliances.

https://youtu.be/ZzGCs9H4Khs

Evgen Blohm, Marius Genheimer - Living on the Edge: Evicting threat actors from perimeter appliances

YouTube

Alixia Rutayisire - The Proxy Warfare: Unmasking Russian and Chinese externalized Cyber Capabilities

This presentation examines how Russia and China increasingly outsource their cyber and influence operations to private entities and individuals, uncovering the strategic motivations, doctrinal basis, and the models behind this trend. We explore how both states leverage eCrime groups, contractors, and tech providers to, accelerate capability growth, and achieve operational flexibility. By contrasting the more decentralized environment in Russia with China's tightly integrated military-civil fusion approach, this presentation offers a in depth look at the evolving ecosystem of state-backed cyber actors.

https://youtu.be/TSQ3-aBdNRM

Alixia Rutayisire - The Proxy Warfare: Unmasking Russian and Chinese externalized Cyber Capabilities

YouTube

Tomer Nahum, Jonathan Elkabas - Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

Identity has become the new perimeter — and in Microsoft Entra ID (formerly Azure Active Directory), is also the easiest one to break. Misconfigured apps, over-scoped permissions, and weak conditional access open the door to attackers who know where to look. In this talk, well walk through real-world Entra ID misconfigurations that led to privilege escalation and domain-wide compromise — all of which have been reproduced in EntraGoat, a new open-source lab that simulates these attack paths in a CTF-style environment. Yoll see step-by-step demos of how attackers exploit these flaws, how defenders can detect them, and how you can use the lab to train, teach, or test in your own environment. Whether youre red team, blue team, or just Entra-curious, you`ll walk away with practical techniques and a tool to keep practicing.

https://youtu.be/F3HRnkp0fV4

Tomer Nahum, Jonathan Elkabas - Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

YouTube

Subverting the Windows Kernel with exploits and rootkits

Deep dive into the journey of writing rootkits and exploits to subvert the windows kernel. Discover undocumented functions alongside novel and creative ways to find vulnerable drivers and break the barrier between user-mode, kernel-mode.

- Rootkit development and the latest techniques

- Exploits for Kernel and how they work

- Protections overview and what to use/code to bypass EDRs and Patchguard

- Exploitation of drivers write-what-where and more

- Hunting for vulnerable drivers and defeating trusted drivers

https://youtu.be/e_asSUhz0rE

Juan Sacco - Subverting the Windows Kernel with exploits and rootkits (BSidesFrankfurt 2025)

YouTube

Moritz Thomas & Firat Acar – Behind Closed Doors: Physical Red Team Tactics

This presentation, led by expert Red Team professionals, dives into physical Red Teaming in corporate and critical infrastructure environments, covering stealthy infiltration techniques like 802.1x bypass, rogue device deployment (e.g., Raspberry Pis), social engineering, and ID card cloning, while sharing real-world insights through engaging case studies, such as a speedrun operation in a European underground facility, to highlight high-pressure scenarios, challenges, and prevention strategies, equipping participants with a clear understanding of physical Red Team dynamics and practical network security and ID cloning countermeasures.

https://youtu.be/f9Ld3WH7L7o

Moritz Thomas, Firat Acar - Behind Closed Doors: Physical Red Team Tactics (BSidesFrankfurt 2025)

YouTube