Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Routing and Tunneling Protocol Attacks

Black Hat via YouTube

Overview

Explore advanced techniques for exploiting routing and tunneling protocols in Windows environments during this Black Hat conference talk. Delve into the intricacies of network security vulnerabilities, learn about potential attack vectors, and discover methods to compromise system integrity through manipulation of routing and tunneling mechanisms. Gain insights from security expert FX as they demonstrate practical examples and discuss countermeasures to protect against these sophisticated threats.

Syllabus

Black Hat Windows 2002 - Routing and Tunneling Protocol Attacks

Taught by

Black Hat

Reviews

Start your review of Routing and Tunneling Protocol Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.