Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps

The sale of exploits and bug bounty programs are at an all-time high, as is their use by cyber criminals. OS vendors, such as Microsoft have progressively implemented a gigantic number of controls to stem the bleeding. Learn how attackers side step mitigations in accessible live demonstrations. New to exploitation or want to learn about the latest mitigations? Come along and learn more!



James Lyne Global Head of Security Research, Sophos & SANS


Stephen Sims Security Researcher, SANS Institute

← View more Videos

This document was retrieved from on Sat, 22 Oct 2016 21:22:55 -0400.
© 2016 EMC Corporation. All rights reserved.