Staying Persistent in Software Defined Networks

Staying Persistent in Software Defined Networks

Black Hat via YouTube Direct link

Network covering systems

9 of 35

9 of 35

Network covering systems

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Staying Persistent in Software Defined Networks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Staying Persistent In Software Defined Networks
  2. 2 Introduction
  3. 3 Overview
  4. 4 Whitebox
  5. 5 Oni
  6. 6 Oni Installer
  7. 7 What does this mean
  8. 8 Ways to compromise
  9. 9 Network covering systems
  10. 10 Network operating systems
  11. 11 OpenSwitch
  12. 12 Kos Linux
  13. 13 Mellanox
  14. 14 Agents
  15. 15 Default Accounts
  16. 16 Unauthorised Access
  17. 17 Keyloggers
  18. 18 Screenshots
  19. 19 Password
  20. 20 Command Injection
  21. 21 Command Line Tools
  22. 22 Live Switches
  23. 23 MTD Devices
  24. 24 Implications
  25. 25 Keylogging
  26. 26 Pivot
  27. 27 Demo
  28. 28 Hardware Trusted Platform Module
  29. 29 Install Environment
  30. 30 Recovering System
  31. 31 Isolation
  32. 32 Racing Ahead
  33. 33 Impact on Security
  34. 34 Make a Difference
  35. 35 Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.