Spoofing Courses
Black Hat via YouTube Complex Paths and Derelict Sentinels - Software Engineering Underpinnings of NTP Vulnerabilities
IEEE via YouTube Attack Vectors in Biometric Recognition Systems - Mobile Authentication Use Case, Blockchain, and More
LASCON via YouTube Harry Potter and the Not-So-Smart Proxy War
media.ccc.de via YouTube Stupid RedTeamer Tricks
NorthSec via YouTube Brute-Forcing Lockdown Harddrive Pin Codes
Black Hat via YouTube Spread Spectrum Satcom Hacking - Attacking The Globalstar Simplex Data Service
Black Hat via YouTube Out of Control - Demonstrating SCADA Device Exploitation
Black Hat via YouTube Building a Blind IP Spoofed Portscanning Tool
Black Hat via YouTube Sniffing and Spoofing with Kali Linux
Pluralsight