The Black Art of Wireless Post Exploitation
Offered By: YouTube
Course Description
Overview
Explore advanced wireless post-exploitation techniques in this conference talk from GrrCON 2017. Delve into the intricacies of manipulating wireless networks after initial access has been gained, learning sophisticated methods for maintaining persistence and expanding control. Gain insights into the "black art" of wireless hacking, including stealthy data exfiltration, pivoting through compromised access points, and evading detection in enterprise environments. Discover cutting-edge tools and tactics used by penetration testers and ethical hackers to thoroughly assess wireless infrastructure security. Whether you're a cybersecurity professional or an aspiring ethical hacker, this presentation offers valuable knowledge to enhance your understanding of wireless network vulnerabilities and post-exploitation strategies.
Syllabus
Gig15 The Black Art of Wireless Post Exploitation Gabriel solstice Ryan
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network