Back To Schedule
Friday, March 13 • 4:00pm - 4:50pm
Hunting Software Vulnerabilities without Reversing

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
Too often, those without reverse engineering skills are dissuaded from hunting vulnerabilities. While a deep level of technical depth is needed for advanced binary exploitation (use after free, heap overflows, etc), there's plenty of attack surface left for the rest of us. In his last WWHF talk, Jake shared techniques for privilege escalation that mostly rely on poorly configured software. In this next installment, he's diving deeper into poorly built software and showing you how you can use simple tools to assess the security of third party and custom applications - no reverse engineering skills are required!

avatar for Jake Williams

Jake Williams

Rendition InfoSec
Jake Williams is an accomplished infosec professional with almost two decades of industry experience. After spending more than a decade in the US Intelligence Community performing various missions in offensive and defensive cyber, Jake founded Rendition Infosec where he leads a team... Read More →