STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA
RECENT JAVA EXPLOITATION TRENDS AND MALWARE
DIGGING DEEP INTO THE FLASH SANDBOXES
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM