Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

via YouTube Direct link

Introduction

1 of 40

1 of 40

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Art Defenses
  3. 3 Discovery Protocol
  4. 4 CDP Attacks
  5. 5 Voice VLAN
  6. 6 DHCP
  7. 7 Default Gateway
  8. 8 DHCP snooping
  9. 9 Dynamic trunking protocol
  10. 10 HSSRP and VRRP
  11. 11 Primary Router
  12. 12 Spanning Tree
  13. 13 Loops
  14. 14 Routing protocols
  15. 15 What can you do with it
  16. 16 What do we do
  17. 17 Defending against BGP
  18. 18 Working relationship with Kevin
  19. 19 Puppet
  20. 20 scape II
  21. 21 voidpopper
  22. 22 Sheena
  23. 23 ASS
  24. 24 Loki
  25. 25 Obe
  26. 26 Platform
  27. 27 OpenWRT
  28. 28 Storage
  29. 29 Exploit Chain
  30. 30 DNS Spoof
  31. 31 Demo
  32. 32 Routers
  33. 33 Network topology
  34. 34 Packet counts
  35. 35 ScapeE
  36. 36 UDP
  37. 37 Launch Attack
  38. 38 Active Router
  39. 39 Phone
  40. 40 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.