Download pdf
The difficulty level in exploiting vulnerabilities in modern applications and operating systems continues to increase. While the world of IoT allows many to relive the past, the current state of the Windows OS and applications such as IE, Edge and MS Office prove to be a challenge. This session will take an in-depth look at cutting-edge exploit techniques, as well as the state of modern mitigations.

Learning Objectives:
1: Gain a greater understanding of modern exploitation.
2: Learn to improve defenses by learning about the techniques used by attackers.
3: Understand the skill level required to identify and exploit bugs.