Loading…
Friday, May 3 • 4:00pm - 5:00pm
Exploit development for penetration testers

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Where is the line between misconfiguration and vulnerability? Red team attacks generally succeed by exploiting well-worn paths, as the resources required to discover new zero-days tend to be more fruitfully spent elsewhere. But does this mean that red team coders don't get to write any interesting new exploits? Far from it!

In this talk, we will walk you through the process of developing a novel file format exploit and using it to root a public cloud service during a 2018 red team. This research, which the authors first presented at Derbycon 8.0, will be accompanied for the first time by the release of a new open source tool.

Speakers
avatar for Adam Reiser

Adam Reiser

Security engineer, Cisco ASIG
Adam is a security engineer with Cisco's Advanced Security Initiatives Group. His work includes pentesting, redteaming, and exploit research. He cultivated an early interest in infosec as a sysadmin at the Open Computing Facility at UC Berkeley, while there completing his physics... Read More →



Friday May 3, 2019 4:00pm - 5:00pm
KEC 17 Market Square Suite 101, Knoxville, TN 37902, United States

Attendees (68)