YoVDO

The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Wireless Security Courses

Course Description

Overview

Explore advanced wireless hacking techniques in this 55-minute conference talk from BSidesLV 2017. Delve into the intricacies of wireless post-exploitation as Gabriel Ryan demonstrates methods for bypassing port-based access controls through indirect wireless pivots. Learn cutting-edge strategies that push the boundaries of network security, offering valuable insights for both offensive and defensive cybersecurity professionals. Gain a deeper understanding of potential vulnerabilities in wireless networks and discover innovative approaches to penetration testing and security assessment.

Syllabus

BG - The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirec


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network