Description: Slides - https://www.defcon.org/images/defcon-18/dc-18-presentations/Brooks/DEFCON-18-Brooks-masSEXploitation.pdf Extra - https://www.defcon.org/images/defcon-18/dc-18-presentations/Brooks/Extras/PHP-Nuke_exploit.php.php.zip This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. Apocalyptic infection -- The Register
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 18 , defcon-18 , dc-18 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.