Runtime exploits continue to create major issues for security practitioners, especially in long-life systems. How are these attacks deployed? What can you do to prevent them? In this webcast, senior SANS instructor Chris Crowley will provide recommendations and guidance and relate his experiences using the RunSafe Security’s Alkemist.
The guide will address:
- An example of a kill-chain in a predominantly interpreted-code environment (risk is present, even in Java/scripted environments, because there is so much compiled code running the interpreted code)
- Other examples of specific, real-world kill chains that utilize memory corruption, with example(s) of an exploit on vulnerable code
- Demonstrating the use of the RunSafe Securitys Alkemist when applied to the exploit and the resulting effect
- Best ways to apply the tool and tips and recommendations
Registration for this event is complimentary. Sponsored by RunSafe Security Inc.
|Wednesday, September 16, 2020|
|Preventing Runtime Exploits: An Implementation Guide for RunSafe Security’s Alkemist||2:00 PM|