Presented at
DerbyCon 6.0 Recharge (2016),
Sept. 23, 2016, 6 p.m.
(50 minutes).
This talk will focus on how to exploit a network by targeting the various first hop protocols. Attack vectors for crafting custom packets as well a few of the available tools for layer 2 network protocols exploitation will be covered. Defensive mitigations and recommendations for adding secure visualization and instrumentation for layer 2 will be provided.
Presenters:
Similar Presentations: