Understanding vulnerabilities to better mitigate threats
Speaker: Steve Povolny, HP
Vulnerabilities in today's commercial and custom software are the primary target for attackers. The most severe are vulnerabilities that can result in code execution—ones that allow an attacker can take complete control of your system and steal information or damage property. In this session, we’ll show you how to analyze a vulnerability in a Microsoft application and how an attacker can quickly move from proof-of-concept to remote code execution. We’ll also share risk mitigation strategies.