Главная
Study mode:
on
1
Introduction
2
Agenda
3
Number of vulnerabilities
4
What is a vulnerability
5
What is an exploit
6
Exploit Databases
7
Exploit Kits
8
Exploit Kit Example
9
Exploit Kit Web UI
10
Top Exploit Kits
11
How can we defend
12
Most affected vendors
13
Targeted OS
14
Local vs Removed
15
Exploit Trends
16
Local vs Remote
17
Lateral Movement
18
Examples
19
Why this is important
20
Exploits for endoflife applications
21
Endoflife application
22
Prioritization
23
Exploit Kit
24
What can we do
25
Outro
Description:
Explore the state of vulnerability exploits in 2016 through this comprehensive conference talk from AppSecEU in Rome. Gain insights into the number of vulnerabilities, understand the concepts of vulnerabilities and exploits, and learn about exploit databases and kits. Discover the top exploit kits, defense strategies, and most affected vendors. Analyze exploit trends, including local vs. remote exploits and lateral movement techniques. Examine the importance of addressing exploits for end-of-life applications and learn effective prioritization methods. Conclude with practical steps to enhance cybersecurity and protect against evolving threats in the digital landscape.

2016 State of Vulnerability Exploits

OWASP Foundation
Add to list