YoVDO

Practical Exploitation Using A Malicious Service Set Identifier - SSID - Deral Heiland

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses Ethical Hacking Courses Command Injection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical exploitation techniques using malicious Service Set Identifiers (SSIDs) in this DerbyCon 3.0 conference talk. Delve into the fundamentals of SSIDs, IEEE standards, and their historical context before examining initial discovery methods and device-specific considerations. Learn about overcoming limitations, registering short domains, and escaping backslashes. Witness demonstrations of cross-site scripting and command injection vulnerabilities, and understand parsing routines and execution challenges. Gain insights into cross-site request forgery attacks and explore testing configurations for various targets. Enhance your knowledge of wireless network security and potential attack vectors through this comprehensive presentation.

Syllabus

Introduction
What is an SSID
ITripleE Standards
History
Initial Discovery
General Devices
Device Order
Limitations
Device Limitations
Register a Short Domain
Escape the Backslash
Crosssite Scripting
Demo
Command Injection
Parsing Routine
Execution
Challenge
Crosssite request forgery
Demonstration
Rube
Prayer
Hells Half Acre
Testing
Configuration
Targets


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network