Star 0

Abstract

The presentation will be about the detected BIG-IP vulnerabilities of F5 Networks and methods for their detection and remedying. Exploitation of these vulnerabilities provides for the possibility to implement a variety of threats ranging from the disclosure of internal non-routable IP addresses of protected servers up to a complete blockage of users’ access to network resources.

Slides