Routing and Tunneling Protocol Attacks
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced techniques for exploiting routing and tunneling protocols in Windows environments during this Black Hat conference talk. Delve into the intricacies of network security vulnerabilities, learn about potential attack vectors, and discover methods to compromise system integrity through manipulation of routing and tunneling mechanisms. Gain insights from security expert FX as they demonstrate practical examples and discuss countermeasures to protect against these sophisticated threats.
Syllabus
Black Hat Windows 2002 - Routing and Tunneling Protocol Attacks
Taught by
Black Hat
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity