Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps

The sale of exploits and bug bounty programs are at an all-time high, as is their use by cyber criminals. OS vendors, such as Microsoft have progressively implemented a gigantic number of controls to stem the bleeding. Learn how attackers side step mitigations in accessible live demonstrations. New to exploitation or want to learn about the latest mitigations? Come along and learn more!



James Lyne Global Research Advisor, Sophos


Stephen Sims Security Researcher, SANS Institute

← View more Videos

This document was retrieved from on Sun, 17 Dec 2017 22:21:32 -0500.
© 2017 EMC Corporation. All rights reserved.