YoVDO

LCDPwn - Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Enterprise Security Courses Vulnerability Analysis Courses

Course Description

Overview

Explore the often-neglected attack surface exposed by layer 2 protocols in enterprise devices through this 35-minute Black Hat conference talk. Delve into the research conducted by Qian Chen, which builds upon the CDPwn findings by Armis labs. Investigate whether vulnerabilities in the Cisco Discovery Protocol (CDP) were adequately addressed, search for potential variants, and examine if other vendors face similar issues. Gain insights into the in-depth analysis of CDP packet parsing code and discover the broader implications for enterprise device security. Learn about the ongoing challenges in securing layer 2 protocols and the potential risks they pose to enterprise networks.

Syllabus

LCDPwn: Breaking Enterprise-Things with Layer 2 Discovery Protocol Vulnerabilities Again


Taught by

Black Hat

Related Courses

Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera
Complete Ethical Hacking Bootcamp
Udemy
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Performing Threat Modeling with the PASTA Methodology
Pluralsight