CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
Offered By: Black Hat via YouTube
Course Description
Overview
Explore five zero-day vulnerabilities discovered in proprietary layer 2 protocols and their severe implications for device and network security. Delve into the attack surface exposed by these protocols and understand how they can be exploited. Learn from security researchers Barak Hadad and Ben Seri as they present their findings in this 37-minute Black Hat conference talk. Gain insights into the potential risks facing enterprise networks and devices, and understand the importance of addressing these hidden bugs. Access the full abstract and presentation materials for a comprehensive overview of the CDPwn vulnerabilities and their impact on millions of enterprise devices.
Syllabus
CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
Taught by
Black Hat
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity