Introducing Weakness Into Security Device: Tuning to a Different Key

Provided by: SecurityTube.net Topic: Format: Webcast
When security devices such as NIDS/NIPS (Network Intrusion Detection/Prevention Systems) are developing their rules/signatures, exploit PoC's tend to be used to develop and test those rules. Sometimes there is lots of PoC code around for a single exploit. Not too much of leap of faith to suggest that those people developing those rules will stick to what they know, and obtain those PoC from the favorite place.

Find By Topic