YoVDO

CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Zero-Day Vulnerabilities Courses

Course Description

Overview

Explore five zero-day vulnerabilities discovered in proprietary layer 2 protocols and their severe implications for device and network security. Delve into the attack surface exposed by these protocols and understand how they can be exploited. Learn from security researchers Barak Hadad and Ben Seri as they present their findings in this 37-minute Black Hat conference talk. Gain insights into the potential risks facing enterprise networks and devices, and understand the importance of addressing these hidden bugs. Access the full abstract and presentation materials for a comprehensive overview of the CDPwn vulnerabilities and their impact on millions of enterprise devices.

Syllabus

CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube