Antonio de Mello & Amine Abed

The attacker's footprint

Chaining low-severity bugs can lead to a full system compromise. We'll show you how to trace the attacker's every step.

 The attacker's footprint
Related jobs
Jobs that call for the skills explored in this talk.

Angular Developer

Picnic Technologies B.V.
Amsterdam, Netherlands

Intermediate
Senior

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.