Thank you for filling out a form!
Now you can download your resource file.Download
[Video] Abusing Insecure WCF Endpoints
- Learn useful techniques to identify vulnerable WCF services
- Discover what to look for when analyzing decomposed .NET assemblies, including those that have been obfuscated
- Watch a demonstration of attacks against real software
Subscribe for Our Updates
Please enter your email address and receive the latest updates.