• 0:00

The sale of exploits and bug bounty programs are at an all-time high, as is their use by cyber criminals. OS vendors, such as Microsoft have progressively implemented a gigantic number of controls to stem the bleeding. Learn how attackers side step mitigations in accessible live demonstrations. New to exploitation or want to learn about the latest mitigations? Come along and learn more!