44CON Information Security Conference
Hunting Asynchronous Vulnerabilities
Explore techniques for uncovering hidden vulnerabilities in backend systems using exploit-induced callbacks. Learn to detect and exploit asynchronous issues across various technologies and platforms.