Talk - The Art of Exploitation

Abstract

In order to understand both the importance and the how to, of mitigating your attackers attempts to exploit your weaknesses, you must first understand your attackers and how they succeed. Kim will examine and demonstrate a collection of essential attacks, commonly used in the exploitation and demise of many individuals and organisations today. Kim will then address the mitigation techniques, and how the whole process of exploitation and mitigation can and should fit within each and every Scrum Sprint. All content is sourced from Kim’s first and second volumes of a three part book series (Holistic Info-Sec for Web Developers) specifically focussed on equipping Web Developers to stay ahead of their attackers.

Date
Location
Online


Some of the PowerShell plays from Kim’s second book: