YoVDO

Malicious Pixels - QR-Codes as Attack Vectors

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Digital Forensics Courses QR Codes Courses

Course Description

Overview

Explore the potential security risks associated with QR codes in this conference talk from TROOPERS13. Delve into how these seemingly innocuous pixelated squares can be exploited as attack vectors. Learn about the various ways malicious actors might manipulate QR codes to compromise security, and gain insights into protective measures. Understand the technical aspects of QR code generation, scanning processes, and vulnerabilities that can be exploited. Discover real-world examples and case studies of QR code-based attacks, and examine the implications for mobile device security and user privacy. Equip yourself with knowledge to identify suspicious QR codes and implement best practices for safe QR code usage in personal and professional contexts.

Syllabus

TROOPERS13 - Malicious pixels: QR-codes as attack vectors - Peter Kieseberg


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube