The popularity of bug bounty programs and the sale and use of exploits are at an all-time high. Microsoft is continually releasing new security patches, bug fixes, and exploit mitigations at a furious pace. Yet new exploits are uncovered almost daily. This talk is intended to help you learn how attackers can bypass exploit mitigations with live demonstrations and easy to understand examples.
Attendees will learn about the technologies behind exploit development and exploit mitigations, how these technologies affect more than just the researchers and exploit developers, and finally, understanding how an attack works helps in reducing attack surface in today’s modern networks.
- The importance of implementing exploit mitigation controls
- Key concepts behind how exploits and exploit mitigations work
- Technologies are available to reduce attack surface of vulnerable applications
About Chris Hernandez
Chris is a Red-teamer for Target Corporation and a former pentester/red-teamer for Veris Group’s Adaptive Threat Division. Chris has experience in the defensive and offensive security space, and In his spare time he is a security researcher and bug-bounty hunter. He is currently a top host based researcher on the Synack bug bounty platform.