This presentation provides an in-depth look at and analysis of zero-day vulnerabilities with the features that make them exploitable on millions of end-user devices or systems. The track includes all the information about failed or unknown exploitation vectors associated with zero-day exploits and the common techniques for taking over a product line in a kind of chain reaction. Beginning with individual systems where vulnerabilities are identified, and extending to the control of an entire product class, this talk will break down everything from zero-day bugs to the botnets that have been built on a structural level. Basically, topics such as speed in building attacks, attack chains and ad hoc persistent threats are covered to fill out the concept of the lecture. During the presentation the disclosure of a universal zero-day vulnerability for Microsoft Windows and Mac Osx will be announced. Enjoy to participate in the track to gain more experience about how exploits are used to takeover millions of digital devices and how those type of attacks are performed on highst level.