The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore advanced wireless hacking techniques in this 55-minute conference talk from BSidesLV 2017. Delve into the intricacies of wireless post-exploitation as Gabriel Ryan demonstrates methods for bypassing port-based access controls through indirect wireless pivots. Learn cutting-edge strategies that push the boundaries of network security, offering valuable insights for both offensive and defensive cybersecurity professionals. Gain a deeper understanding of potential vulnerabilities in wireless networks and discover innovative approaches to penetration testing and security assessment.
Syllabus
BG - The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirec
Taught by
BSidesLV
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network