Introducing Weakness Into Security Device: Tuning to a Different Key

When security devices such as NIDS/NIPS (Network Intrusion Detection/Prevention Systems) are developing their rules/signatures, exploit PoC's tend to be used to develop and test those rules. Sometimes there is lots of PoC code around for a single exploit. Not too much of leap of faith to suggest that those people developing those rules will stick to what they know, and obtain those PoC from the favorite place.

Provided by: SecurityTube.net Topic: Date Added: Mar 2015 Format: Webcast

Find By Topic