Talk - The Art of Exploitation


In order to understand both the importance and the how to, of mitigating your attackers attempts to exploit your weaknesses, you must first understand your attackers and how they succeed. Kim will examine and demonstrate a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today. Kim will then address the mitigation techniques, and how the whole process of exploitation and mitigation can and should fit within each and every Scrum Sprint. All content is sourced from Kim’s first and second volumes of a three part book series (Holistic Info-Sec for Web Developers) specifically focussed on equipping Web Developers to stay ahead of their attackers.


Some of the PowerShell plays from Kim’s second book:

Kim Carter
Technologist / Engineer, Information Security Professional

Technologist / Engineer, Information Security Professional, Entrepreneur and the founder of BinaryMist Ltd. OWASP NZ Chapter Leader. Certified Scrum Master. Facilitator, mentor and motivator of cross functional, self managing teams. With a solid 18 years of commercial industry experience across many domains.