Completed
Post Deployment Exploitation -Wireless Attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malicious MDM: Exploiting iOS MobileConfigs for Device Control
Automatically move to the next video in the Classroom when playback concludes
- 1 IOS users Scan to Connect to the AppSec California Wireless Network Open the URL in Safari
- 2 Architectures: - Client Server Model - Email/URL/Application enrollment -One Time Application Profiles typically deployed from
- 3 Direct USB Connection -iPhone Configuration Utility
- 4 Post Deployment Exploitation -Wireless Attack
- 5 Post Deployment Exploitation -Application Attacks Custom Applications
- 6 Post Deployment Exploitation -So you have credentials... Single Factor VPN (PPTP) - Internet facing authentication
- 7 Preventions -Start with clean phones, then