In this session, Tod Beardsley (runZero) is joined by Jared Atkinson (SpecterOps), Zakir Durumeric (Censys), and HD Moore (runZero) to discuss the complexities of modern attack surfaces, focusing on the perimeters and pathways that connect internal networks to the global internet. The experts highlight that the traditional idea of a single, well-defined network perimeter is obsolete, replaced by a satellite model of thousands of cloud accounts, remote control systems, and data-sovereignty-compliant providers. Zakir emphasizes that the network infrastructure itself — including firewalls, VPNs, and LTE modems — has become a prime target for initial access, blurring the line between internal and external assets.
The discussion moves into the pathways attackers take once they gain initial access, with Atkinson detailing how BloodHound maps identity-based attack paths through systems like Active Directory, Okta, and GitHub. He explains that by layering network infrastructure data from runZero with identity graphs, defenders can identify non-obvious 4D pathways to high-value targets. HD Moore adds that satellite hunting from the inside — fingerprinting internal TLS services and searching for matching hashes on the public internet — reveals hidden connections and misconfigurations, such as management ports exposed to guest wireless networks, that completely bypass intended segmentation.
Watch more sessions from runZero Day
| Session Title | Guests | |
|---|---|---|
| Watch Session | A CVE quagmire: Quality versus quantity | Jerry Gamblin, RogoLabs |
| Watch Session | Predicting exploitation: A practitioner's guide | Jay Jacobs, Empirical Security |
| Watch Session | Signal vs slop: Journalists on the evolution of research-driven reporting | Bill Brenner, CYBER.SEC.Community Dennis Fisher, Decipher Steve Ragan, 1Password |
| Watch Session | On the frontlines of investigative journalism in cybersecurity: An insider's perspective | Joseph Menn, Author & Investigative Journalist |
| Watch Session | From risk to resilience: Navigating OT security in a converged world | Mary Gannon, GuidePoint Security Patrick Gillespie, GuidePoint Security |
| Watch Session | Force multiplied: Community-powered vuln detection | Rishi Sharma, ProjectDiscovery |
| Watch Session | Mute the sirens: Prioritizing vulnerability noise | Mark Lambert, ArmorCode |
| Watch Session | The network edge: EOL and exploitation | Kimber Duke, VulnCheck Patrick Garrity, VulnCheck |
| Watch Session | Bug bounties in the age of AI | Casey Ellis, Bugcrowd |
| Watch Session | Perimeters and pathways: Protecting the complete attack surface | HD Moore, runZero Jared Atkinson, SpecterOps Zakir Durumeric, Censys |
| Watch Session | The infinite eye: How AI threat intelligence gives defenders an asymmetric edge | HD Moore, runZero Jonathan Cran, Mallory |
Get the latest news and expert insights delivered in your inbox.