YoVDO

CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Zero-Day Vulnerabilities Courses

Course Description

Overview

Explore five zero-day vulnerabilities discovered in proprietary layer 2 protocols and their severe implications for device and network security. Delve into the attack surface exposed by these protocols and understand how they can be exploited. Learn from security researchers Barak Hadad and Ben Seri as they present their findings in this 37-minute Black Hat conference talk. Gain insights into the potential risks facing enterprise networks and devices, and understand the importance of addressing these hidden bugs. Access the full abstract and presentation materials for a comprehensive overview of the CDPwn vulnerabilities and their impact on millions of enterprise devices.

Syllabus

CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days


Taught by

Black Hat

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity