BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//event.sec-t.org//sec-t-2025//talk//WWWX7Q
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-sec-t-2025-WWWX7Q@event.sec-t.org
DTSTART;TZID=CET:20250912T135500
DTEND;TZID=CET:20250912T142500
DESCRIPTION:Identity has become the new perimeter and in Microsoft Entra ID
  (formerly Azure Active Directory)\, it’s also the easiest one to break.
  Misconfigured apps\, over-scoped permissions\, and weak conditional acces
 s open the door to attackers who know where to look. \n\nIn this talk\, we
 ’ll walk through real-world Entra ID misconfigurations that led to privi
 lege escalation and domain-wide compromise all of which have been reproduc
 ed in EntraGoat\, a new open-source lab that simulates these attack paths 
 in a CTF-style environment. \n\nYou’ll see step-by-step demos of how att
 ackers exploit these flaws\, how defenders can detect them\, and how you c
 an use the lab to train\, teach\, or test in your own environment. Whether
  you’re red team\, blue team\, or just Entra-curious\, you’ll walk awa
 y with practical techniques and a tool to keep practicing.
DTSTAMP:20260419T152738Z
LOCATION:Main hall
SUMMARY:Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate 
 - Tomer Nahum\, Jonathan Elkabas
URL:https://event.sec-t.org/sec-t-2025/talk/WWWX7Q/
END:VEVENT
END:VCALENDAR
