← All talks

Zero Trust: How Attackers Steal Identities & Gain Access #shorts

BSides Frankfurt0:38898 viewsPublished 2026-04Watch on YouTube ↗
About this talk
In a Zero Trust environment, privilege escalation is simply stealing new identities. Attackers hunt for secrets, gain more access, and repeat the cycle. A low-permission token can lead to a long-term secret, enabling endless advancement. #ZeroTrust #CyberSecurity #PrivilegeEscalation #IdentityManagement #bsidesfrankfurt #bsidesfra
Show transcript [en]

What does privilege escalation and pivoting look like in a zero-trust environment? It's just stealing new identities. That's all it is. And so, they get in, they keep hunting, they find these secrets, they get more access, they rerun all the stuff they did with the low-level access with the high-level access, they find even more access, and they keep repeating. And that's that's all it is. It's just stealing more identities. And maybe you have maybe they get in with a low-permission session token that expires in 6 hours. But then they find a secret that doesn't expire or expires in a week. And then with that, they have more access, and they just keep going from there. And I'll get into that with

the real-world examples.