Patching Exploits with Duct Tape: Bypassing Mitigations and Backward Steps

The sale of exploits and bug bounty programs are at an all-time high, as is their use by cyber criminals. OS vendors, such as Microsoft have progressively implemented a gigantic number of controls to stem the bleeding. Learn how attackers side step mitigations in accessible live demonstrations. New to exploitation or want to learn about the latest mitigations? Come along and learn more!



James Lyne Director of Research, SANS Institute


Stephen Sims SANS Faculty Fellow, PenTest and Cyber Defense Essentials Curriculum Lead

← View more Videos

This document was retrieved from on Mon, 19 Aug 2019 10:16:06 -0400.