The popularity of bug bounty programs and the sale and use of exploits are at an all-time high. Microsoft is continually releasing new security patches, bug fixes, and exploit mitigations at a furious pace. Yet new exploits are uncovered almost daily. This talk is intended to help you learn how attackers can bypass exploit mitigations with live demonstrations and easy to understand examples.
Attendees will learn about the technologies behind exploit development and exploit mitigations, how these technologies affect more than just the researchers and exploit developers, and finally, understanding how an attack works helps in reducing attack surface in today’s modern networks.