LCDPwn - Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the often-neglected attack surface exposed by layer 2 protocols in enterprise devices through this 35-minute Black Hat conference talk. Delve into the research conducted by Qian Chen, which builds upon the CDPwn findings by Armis labs. Investigate whether vulnerabilities in the Cisco Discovery Protocol (CDP) were adequately addressed, search for potential variants, and examine if other vendors face similar issues. Gain insights into the in-depth analysis of CDP packet parsing code and discover the broader implications for enterprise device security. Learn about the ongoing challenges in securing layer 2 protocols and the potential risks they pose to enterprise networks.
Syllabus
LCDPwn: Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again
Taught by
Black Hat
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight