AI Adoption - Drive Business Value and Organizational Impact
50% OFF: In-Depth AI & Machine Learning Course
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced techniques for exploiting routing and tunneling protocols in Windows environments during this Black Hat conference talk. Delve into the intricacies of network security vulnerabilities, learn about potential attack vectors, and discover methods to compromise system integrity through manipulation of routing and tunneling mechanisms. Gain insights from security expert FX as they demonstrate practical examples and discuss countermeasures to protect against these sophisticated threats.
Syllabus
Black Hat Windows 2002 - Routing and Tunneling Protocol Attacks
Taught by
Black Hat