8c51cb4e30bcd71ea97b15883d362534

Abstract

The session intends to give an overview on how an end user can be compromised with practical examples.

Tries to answer below questions:
What is an exploit?
How do exploits attack?
Which software is vulnerable?
Types of exploits.

Speaker

Gajendra Kumar

Timing

Starts at Saturday April 22 2017, 01:00 PM. The sessions runs for about 1 hour.

Resources