2016 State of Vulnerability Exploits

2016 State of Vulnerability Exploits

OWASP Foundation via YouTube Direct link

Introduction

1 of 25

1 of 25

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

2016 State of Vulnerability Exploits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Number of vulnerabilities
  4. 4 What is a vulnerability
  5. 5 What is an exploit
  6. 6 Exploit Databases
  7. 7 Exploit Kits
  8. 8 Exploit Kit Example
  9. 9 Exploit Kit Web UI
  10. 10 Top Exploit Kits
  11. 11 How can we defend
  12. 12 Most affected vendors
  13. 13 Targeted OS
  14. 14 Local vs Removed
  15. 15 Exploit Trends
  16. 16 Local vs Remote
  17. 17 Lateral Movement
  18. 18 Examples
  19. 19 Why this is important
  20. 20 Exploits for endoflife applications
  21. 21 Endoflife application
  22. 22 Prioritization
  23. 23 Exploit Kit
  24. 24 What can we do
  25. 25 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.