YoVDO

The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Wireless Security Courses

Course Description

Overview

Explore advanced wireless hacking techniques in this 55-minute conference talk from BSidesLV 2017. Delve into the intricacies of wireless post-exploitation as Gabriel Ryan demonstrates methods for bypassing port-based access controls through indirect wireless pivots. Learn cutting-edge strategies that push the boundaries of network security, offering valuable insights for both offensive and defensive cybersecurity professionals. Gain a deeper understanding of potential vulnerabilities in wireless networks and discover innovative approaches to penetration testing and security assessment.

Syllabus

BG - The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirec


Taught by

BSidesLV

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX