See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

Black Hat via YouTube Direct link

Evaluation

10 of 18

10 of 18

Evaluation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

See Like a Bat - Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why do we care about MAN
  3. 3 Types of MAN attacks
  4. 4 See like a bat
  5. 5 Impulse response
  6. 6 Application to a LAN
  7. 7 ManintheMiddle Attacks
  8. 8 Vesper
  9. 9 Outliers
  10. 10 Evaluation
  11. 11 Multiple Intermediaries
  12. 12 Long Haul
  13. 13 How an adversary can mess with us
  14. 14 Why not just one feature
  15. 15 Results
  16. 16 Vesper tool
  17. 17 Vesper deployment
  18. 18 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.