У нас вы можете посмотреть бесплатно Reinventing Access Control: Fingerprinting for Creds Protection | Tech Talk by Aditya | VULNCON 2025 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this technical talk, Aditya Singh breaks down “Reinventing Access Control: Fingerprinting for Credential Protection”—a cutting-edge approach to stopping credential theft in an era where identity is the new attack surface. Aditya unpacks how browser, network, and hardware-level fingerprinting can accurately identify users across devices and platforms, offering organizations a powerful line of defense against spoofing, session hijacking, and unauthorized access. Speaker: Aditya Singh Cybersecurity Analyst, Turtleneck Systems & Solutions | Independent Security Researcher Aditya has worked as a Research Intern at IIT Bombay, building a Mobile Device Fingerprinting module for Suricata, and as a Threat Analyst at NTRO. With experience across threat research and defensive security, he has spoken at major conferences including Delhi Defcon, BlackHat, Nullcon, and BSides, contributing impactful research to the security community. LinkedIn: / aditya-singh--- Key Highlights: The evolution of device fingerprinting in modern access control Browser, network, and hardware artifacts used to build unique user identities Preventing credential misuse through granular verification Strengthening organizational security against spoofing and identity-based attacks Follow Us, LinkedIn: / vulncon X: / vulncon Instagram: / vulncon 0:08 - Introduction to access control 1:04 - What is digital fingerprinting? 2:44 - Types of fingerprints explained 3:29 - Browser fingerprinting characteristics 5:51 - Browser differences in web audio APIs 7:25 - Introduction to canvas fingerprinting 8:40 - Generating unique identifiers with favicons 10:40 - Clearing site data and cookies process 12:16 - Favicon retrieval process explained 14:32 - Introduction to device fingerprinting 15:55 - GPU fingerprinting using WebGL API 17:20 - Overview of math fingerprinting techniques 18:19 - Creating mathematical fingerprints 19:05 - Introduction to TLS fingerprinting 20:10 - Identifying anomalies with fingerprints 21:09 - CPU fingerprinting techniques explained 24:17 - Hardware aging and its implications 25:10 - Integrating fingerprinting into access controls 26:01 - Continuous session verification explained 27:20 - Privacy concerns with fingerprinting techniques #vulncon2025 #cybersecurity #digitalindia #infosec #techtalk #accesscontrol #fingerprinting #dataprotection