Overview
Explore the landscape of wireless protocols and associated threat models in this comprehensive Black Hat USA 2002 conference talk. Delve into the intricacies of various wireless technologies, understanding their underlying mechanisms and potential vulnerabilities. Gain valuable insights into the security challenges posed by wireless communications and learn about the different attack vectors that malicious actors may exploit. Analyze real-world scenarios and case studies to better comprehend the risks and mitigation strategies in wireless environments. Equip yourself with the knowledge to assess and enhance the security posture of wireless networks, making informed decisions to protect against potential threats in an increasingly connected world.
Syllabus
Black Hat USA 2002 - Wireless Overview: Protocols & Threat Models
Taught by
Black Hat