June 19, 2023, 11 a.m. | Wild West Hackin' Fest

Wild West Hackin' Fest www.youtube.com

Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Macro-laced Word documents, malicious HTAs, dumping LSASS, WMI, and Kerberoasting – the bread-and-butter of offensive security. Rarely do binary exploits fall under the purview of “standard” offensive toolkits. Why is this? This talk looks into contemporary exploit mitigations on Windows, such as control-flow integrity and code-signing, and how they affect the cost of developing exploits in today’s age. “Point-and-click” exploits …

age binary bread click code control cost documents dumping exploit exploits flow integrity lsass macro malicious mitigations offensive offensive security point security signing standard under windows wmi word

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France