Hacking Corporations Using Unconventional Chained Exploits presented at HITBSecConf Malaysia 2013

by N/a ,

URL : Over the past decade, the overall complexity of networks has grown exponentially. Nowadays, corporations employ several mechanisms and technologies to handle, manage, and secure their sensitive data a

Summary : This presentation will cover several examples of unconventional chained exploits used in real-world penetration tests; provide a detailed technical walkthrough of the exploits used along with some tricks to gain unauthorized access and bypass security controls on critical network components. In closing, this presentation will look beyond adaptive penetration testing by providing a glimpse into some of the future directions in the use of unconventional chained exploits that are currently being explored by independent researchers around the globe.