Hi {{ session.user.profile.firstName }}

Understanding Vulnerabilities to Better Mitigate Threats

Manage webcast
Steve Povolny, Senior Security Researcher, HP DVLabs
Vulnerabilities that exist in today’s commercial and custom software are the primary target for attackers. The most severe of these vulnerabilities are those that can result in remote code execution – that is an attacker can take complete control of another system for the purposes of stealing information, defacing property or just causing trouble. In this session, Brian Gorenc, will demonstrate how to analyze a vulnerability and the steps required to weaponize it. Centering on a vulnerability in a Microsoft application, the demo will show you how an attacker can quickly move from proof-of-concept to remote code execution. The discussion will also include thoughts on mitigation strategies for reducing risk.
Jun 21 2012
45 mins
Understanding Vulnerabilities to Better Mitigate Threats

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding Vulnerabilities to Better Mitigate Threats
  • Live at: Jun 21 2012 9:00 pm
  • Presented by: Steve Povolny, Senior Security Researcher, HP DVLabs
  • From:
Your email has been sent.
or close
You must be logged in to email this