Join us for a technical deep dive on:
- What is a Fileless Attack and why is it so dirty?
- How exploits circumvent common countermeasures
- DEMO 1: NGINX Attack – see an exploit circumvent all the common countermeasures
- Polymorphing for Linux and Open Source
- DEMO 2: SSH Attack: exploiting a buffer overflow – watch a live attack without Polymorphing, then with Polymorphing.
- Deep dive on Polymorphing and the underlying technology
- DEMO 3: See a live Boothole vulnerability attack then we’ll disassemble and analyze a Polymorphed program