Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the weaponization of Ethernet and evasion of common detections in this 20-minute conference talk from BSidesLV. Dive into the Data Link Layer's role in MAC-to-MAC communication and learn how information can be encoded on frames. Discover techniques for extending the range of layer 2 communication beyond traditional broadcast domain limitations. Gain insights into raw socket programming, AD-Hoc Wi-Fi, and other methods for manipulating the OSI stack to achieve covert communication. Presented by Mohnish Dhage and Elysee Franchuk, this talk challenges the common consensus on layer 2 range limitations and introduces innovative bypasses for enhanced network exploitation.