BruCON Security Conference
I Am Become Loadbalancer, Owner of Your Network
Explore load balancer vulnerabilities, architecture, and post-breach tactics. Learn about high-profile exploits, device deployment, and how to navigate these critical network components for both offensive and defensive purposes.