Abstract

for research purposes only

The talk will cover the exploit code and scenario to achieve code execution at victim end via SE.

The technique is often used by state and non-state actors for variety of reasons.

Speaker

Aamer Shah

<aamer value="profile" ref="Kashmir" location="dXB".currentPlace="Dubai" action='webDeveloper' position='penTester' workOnClick=Mercedes.Benz.value(former) onfocus_employer="etisalat" mail=official@aamershah.com> ♡ n|u </aamer>

Contact me via Telegram (https://AamerShah.t.me) or LinkedIn only.

Timing

Starts at Friday September 28 2018, 06:00 PM. The sessions runs for about 1 hour.

Resources