Advanced Techniques in Data Visualization - Self Paced Online
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the vulnerabilities of smartphones through QR code exploitation in this comprehensive video. Learn how hackers can embed Wi-Fi backdoors into QR codes, enabling them to track targets and hijack data connections. Dive into topics such as hidden Wi-Fi networks, QR code generation, Wireshark tracking, Huhnitor usage, and rogue access point creation. Gain insights into the potential security risks associated with smartphone convenience features and understand the techniques used by malicious actors to compromise mobile devices.
Syllabus
Countdown
Intro
Hidden WiFi Networks
Generating QR Codes
Wireshark Tracking
Huhnitor
Rogue Access Point
Closing Thoughts
Taught by
SecurityFWD