{"code":"9ZRUAL","speakers":[{"code":"L8NEN9","name":"Benjamin Floriani","biography":"My fascination about complex systems began early on - with hacking computer games. While studying computer science at the University of Innsbruck, I discovered the Austrian Cyber Security Challenge, a capture-the-flag competition that promotes IT security talents in Austria.\r\n\r\nMy successful participation in this competition opened my way into professional IT security at the end of 2017. Since then, I have been pursuing my passion as a penetration tester. I have specialized in the field of red teaming and attack simulations through numerous further education and training courses - a field that continues to fascinate me.\r\n\r\nI am currently deepening my knowledge in the areas of internal infrastructures and malware development. This enables me not only to increase the precision of our penetration tests, but also to implement techniques such as lateral movement, local privilege escalation and full domain compromise in red team engagements even more effectively.","avatar":"http://cfp.bsidesvienna.at/media/avatars/benjamin_profile_7ONlGif.jpg"},{"code":"PGCB8K","name":"P'atrick Pong<br>atz","biography":"i love javascript, for example i love running javascript in image tags like <img src=\"https://leberkas.club/favicon.ico\" onerror=\"javascript:alert(1)\" onload=\"javascript:alert(1)\"></img> or svgs like <svg onload=alert('XSS')><svg><p><style><img src=\"data:,\" onerror=\"alert(1)\">\r\n\r\n<scr<script>ipt>alert(1)</scr<script>ipt>","avatar":null}],"title":"How To Breach: From Unconventional Initial Access Vectors To Modern Lateral Movement","submission_type":{"en":"Talk"},"track":{"en":"Main Track"},"state":"confirmed","abstract":"The perpetual cat-and-mouse game between attackers and defenders has\r\npushed offensive security operators to innovate. While enterprise security\r\nteams have become adept at identifying and blocking malicious Office\r\ndocuments, suspicious executables, and known phishing URLs, a significant\r\nblind spot often remains: the gray area of \"benign\" file formats that are\r\nimplicitly trusted by both users and security tools. This talk will arm\r\nattendees with the knowledge to identify and leverage these blind spots in\r\nred team engagements.\r\n\r\nWe will begin by exploring the strategic shift from noisy, high-volume\r\nattacks to stealthy, low-profile techniques designed to circumvent modern\r\nEDR, email gateways, and web proxies. We'll discuss why certain file types\r\nand delivery mechanisms succeed where others fail, focusing on the\r\ntechnical elements that make them effective. This includes exploiting the\r\nbrowser's rendering engine and abusing features in file formats that were\r\nnever intended for malicious use. The mainpart of the presentation is a\r\ndetailed, step-by-step walkthrough of an attackchain using a weaponized\r\nSVG image, infecting a user with malware and spreading laterally with\r\nintune.\r\n\r\nWe will demonstrate the entire attack chain:\r\n\r\n-) Crafting the Lure: Creating a malicious SVG that, when opened, executes\r\nthe malicious content.\r\n-) Delivery & Execution: Discussing methods for delivering the payload and\r\ngiving alternatives to SVG images.\r\n-) Infection & Lateral Movement: Showcasing how the malware gets executed\r\nand how Microsoft Intune can be used afterwards to move laterally through\r\nthe network.\r\n\r\nBeyond the SVG case study, we will briefly cover other unconventional\r\nvectors to broaden the audience's perspective.\r\nAttendees will leave this session with a new arsenal of TTPs. Red teamers\r\nwill learn how to build more sophisticated and evasive initial access\r\ncampaigns. Blue teamers and defenders will gain insights into these\r\nemerging threats, learning what artifacts to hunt for.","description":"","duration":60,"slot_count":1,"do_not_record":false,"is_featured":false,"content_locale":"en","slot":{"room":{"en":"Track 1"},"start":"2025-11-22T13:05:00+01:00","end":"2025-11-22T14:05:00+01:00"},"image":"http://cfp.bsidesvienna.at/media/bsidesvienna-0x7e9-2025/submissions/9ZRUAL/PoC_Weaponized_2JCO8SU.svg","resources":[]}