YoVDO

An Analysis of Tactics Used in Discovering Passive Monitoring Devices - Part 2

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses

Course Description

Overview

Explore advanced techniques for detecting passive monitoring devices in this in-depth conference talk from Black Hat USA 2000. Delve into the analysis of various tactics employed to uncover hidden surveillance equipment, gaining valuable insights into network security and counter-surveillance measures. Learn from industry expert Mudge as he shares his knowledge and experience in identifying and mitigating potential threats posed by covert monitoring systems.

Syllabus

Black Hat USA 2000 - An Analysis of Tactics Used in Discovering "Passive" Monitoring Devices pt.2


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube