Detecting a vulnerability is one thing, exploiting it is another. The actual severity of a vulnerability may not be appreciated until someone sees their private data being rinsed out before their eyes.
By their nature, some vulnerabilities are harder to exploit than others. Still, when a researcher (or bad guy) spots the hint of something “not quite right”, they will ruthlessly pursue the thing until it is exploited, leading to new and exotic techniques.
In this educational webinar, AppCheck and CommSec will build up an understanding of various exploitation techniques, working from more basic to more exotic scenarios, sparing no detail whilst remaining accessible to non-technical audiences.
Join cyber security experts from AppCheck and CommSec as they explore the different exploitation techniques and see real-life vulnerabilities in the wild.