CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
Offered By: Black Hat via YouTube
Course Description
Overview
Explore five zero-day vulnerabilities discovered in proprietary layer 2 protocols and their severe implications for device and network security. Delve into the attack surface exposed by these protocols and understand how they can be exploited. Learn from security researchers Barak Hadad and Ben Seri as they present their findings in this 37-minute Black Hat conference talk. Gain insights into the potential risks facing enterprise networks and devices, and understand the importance of addressing these hidden bugs. Access the full abstract and presentation materials for a comprehensive overview of the CDPwn vulnerabilities and their impact on millions of enterprise devices.
Syllabus
CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube