Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore offensive security techniques and bypass methods for Enhanced Mitigation Experience Toolkit (EMET) in this 33-minute conference talk from BSides Cleveland 2014. Delve into topics such as offensive protections, application profiles, and configuration options. Learn about vulnerability selection, disassembly techniques, and the concept of rock chain. Gain insights into why two pointers are used and witness a demonstration on disabling encode pointer. Conclude with closing thoughts and valuable references to enhance your understanding of EMET and its vulnerabilities.