An Analysis of Tactics Used in Discovering Passive Monitoring Devices - Part 2
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced techniques for detecting passive monitoring devices in this in-depth conference talk from Black Hat USA 2000. Delve into the analysis of various tactics employed to uncover hidden surveillance equipment, gaining valuable insights into network security and counter-surveillance measures. Learn from industry expert Mudge as he shares his knowledge and experience in identifying and mitigating potential threats posed by covert monitoring systems.
Syllabus
Black Hat USA 2000 - An Analysis of Tactics Used in Discovering "Passive" Monitoring Devices pt.2
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube