Twisting Layer 2 Protocols
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the intricacies of Layer 2 protocol manipulation in this 28-minute conference talk from DefCamp 2017. Dive into advanced hacking techniques and information security practices focused on twisting Layer 2 protocols. Gain insights from leading security specialists and researchers in the field of network security. Learn about potential vulnerabilities and attack vectors at the data link layer, and understand how to better protect your networks from these threats. Access additional resources, including slides and presentations, through the DefCamp archive for a comprehensive learning experience on this critical aspect of cybersecurity.
Syllabus
DefCamp 2017 - Twisting Layer 2 Protocols
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube