Description: https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-all_your_sploits-1.pdf https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-all_your_sploits-2.pdf https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-all_your_sploits-3.pdf https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-all_your_sploits-4.pdf Think that latest buffer overflow or XSS exploit matters? It doesn't. Think your network is secure because you have the latest and greatest IPS? It isn't. The truth is all exploits or defenses on their own are worthless; it's how you use your tools and respond to incidents that really matters. This panel, composed of top vulnerability and security researchers, will roll through a rapid-fire series of demonstrations as they smash through the security of popular consumer and enterprise devices and systems, often using simple techniques rather than the latest 0day exploits (but we'll see a few of those too). They'll then debate the value of any single attack vector or defense, and show how it's the practical application of attacks, defenses, and (more importantly) responses that really matters. From iPhones to browsers to SCADA, it isn't your advanced attack or defensive tool that matters, it's what you do with it.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 16 , Defcon 16 , dc-16 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.