Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps

  • Thursday, April 23, 2015 | 8:00 AM – 8:50 AM | West | Room: 3014

View all Sessions

The sale of exploits and bug bounty programs are at an all-time high, as is their use by cyber criminals. OS vendors, such as Microsoft have progressively implemented a gigantic number of controls to stem the bleeding. Learn how attackers side step mitigations in accessible live demonstrations. New to exploitation or want to learn about the latest mitigations? Come along and learn more!


This document was retrieved from on Tue, 25 Oct 2016 22:15:13 -0400.
© 2016 EMC Corporation. All rights reserved.