Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the often-neglected attack surface exposed by layer 2 protocols in enterprise devices through this 35-minute Black Hat conference talk. Delve into the research conducted by Qian Chen, which builds upon the CDPwn findings by Armis labs. Investigate whether vulnerabilities in the Cisco Discovery Protocol (CDP) were adequately addressed, search for potential variants, and examine if other vendors face similar issues. Gain insights into the in-depth analysis of CDP packet parsing code and discover the broader implications for enterprise device security. Learn about the ongoing challenges in securing layer 2 protocols and the potential risks they pose to enterprise networks.