Abstract

for research purposes only

The talk will cover the exploit code and scenario to achieve code execution at victim end via SE.

The technique is often used by state and non-state actors for variety of reasons.

Speaker

Aamer Shah

<aamer value="profile" ref="Kashmir" location="India".currentPlace="Dubai" action='webDeveloper' position='penTester' workOnClick=Mercedes.Benz.value(former) onfocus_employer="spectrami.com" mail=official@aamershah.com> ♡ n|u </aamer>

Contact me via Twitter or LinkedIn only

Timing

Starts at Friday September 28 2018, 06:00 PM. The sessions runs for about 1 hour.

Resources