YoVDO

The Black Art of Wireless Post-Exploitation - Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Wireless Security Courses

Course Description

Overview

Explore advanced wireless hacking techniques in this 55-minute conference talk from BSidesLV 2017. Delve into the intricacies of wireless post-exploitation as Gabriel Ryan demonstrates methods for bypassing port-based access controls through indirect wireless pivots. Learn cutting-edge strategies that push the boundaries of network security, offering valuable insights for both offensive and defensive cybersecurity professionals. Gain a deeper understanding of potential vulnerabilities in wireless networks and discover innovative approaches to penetration testing and security assessment.

Syllabus

BG - The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirec


Taught by

BSidesLV

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube