Stephen Reese

While experimenting with EMET I decided to put together a little presentation demonstrating how it can be used to prevent exploitation of a known threat to Acrobat Reader. The presentation first demonstrates the exploit using Metasploit, provides some high level analysis and then goes on to describe how EMET can mitigate the vulnerability. It may be a little choppy to follow so feel free to provide any constructive feedback. The presentation is available via PDF.


Comments

comments powered by Disqus