Date: Thursday 11 June
Time: 15:00 (BST) UK
Attack in the middle (AITM) attacks bypass MFA and hijack sessions in real time without cracking credentials. By sitting between user and authentication service, attackers intercept tokens and steal valid sessions that appear legitimate. With AI-assisted phishing kits, these attacks are harder to detect than ever.
This is where threat-led penetration testing becomes critical, moving beyond theory to validate how these attacks actually play out against real environments, not just whether controls exist on paper.
In this session, we won’t just tell you about it, we'll show you. The session closes with a live simulated attack, stepping through real-time session interception and account takeover to reveal just how quickly trusted access can be compromised in the wild.
Key Takeaways:
- How AITM attacks really work
- Why traditional controls are falling short
- What attacks look like in the wild
- What you can do to stay one step ahead
About our Speaker
Bobby Spooner is a Managing Principal Security Consultant at LRQA. As a CREST Certified Red Team Manager (CCRTM), Bobby has expertise overseeing intelligence-led red teaming engagements across the world. Previously, Bobby has built and managed operational security assurance in a large UK Government Department, alongside managing red and purple teaming across UK Critical National Infrastructure (CNI).
