YoVDO

Routing and Tunneling Protocol Attacks

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses

Course Description

Overview

Explore advanced techniques for exploiting routing and tunneling protocols in Windows environments during this Black Hat conference talk. Delve into the intricacies of network security vulnerabilities, learn about potential attack vectors, and discover methods to compromise system integrity through manipulation of routing and tunneling mechanisms. Gain insights from security expert FX as they demonstrate practical examples and discuss countermeasures to protect against these sophisticated threats.

Syllabus

Black Hat Windows 2002 - Routing and Tunneling Protocol Attacks


Taught by

Black Hat

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity