Modern Exploitation: Owning All of the Things (repeat)

Posted on in Presentations

The difficulty level in exploiting vulnerabilities in modern applications and operating systems continues to increase. While the world of IoT allows many to relive the past, the current state of the Windows OS and applications such as IE, Edge and MS Office prove to be a challenge. This session will take an in-depth look at cutting-edge exploit techniques, as well as the state of modern mitigations.

Learning Objectives:
1: Gain a greater understanding of modern exploitation.
2: Learn to improve defenses by learning about the techniques used by attackers.
3: Understand the skill level required to identify and exploit bugs.
James Lyne


Chief Technology Officer, SANS Institute

Stephen Sims


SANS Faculty Fellow, PenTest and Cyber Defense Essentials Curriculum Lead

Hackers & Threats

exploit of vulnerability hackers & threats anti-malware zero day vulnerability endpoint security



Share With Your Community