PowerBI Data Analyst - Create visualizations and dashboards from scratch
Become an AI & ML Engineer with Cal Poly EPaCE — IBM-Certified Training
Overview
AI, Data Science & Cloud Certificates from Google, IBM & Meta — 40% Off
One plan covers every Professional Certificate on Coursera. 40% off your first 3 months — limited time.
Unlock All Certificates
Explore the vulnerabilities of MAC address filtering in public networks like hotels and airplanes in this 49-minute video. Delve into topics such as MAC filtering on home routers, hacker techniques to bypass filtering, MAC addresses leaving networks, blacklist testing, and changing MAC addresses. Learn about circumventing blacklists, MAC whitelisting demonstrations, detecting other devices on networks, and cloning MAC addresses. Gain insights into network security weaknesses and potential exploits through practical demonstrations and expert discussions.
Syllabus
Countdown
Intro
MAC Filtering on Your Home Router
How Hackers Defeat MAC Filtering
MAC Addresses that Leave a Network
MAC Blacklist Testing
Changing your MAC
Circumventing the Blacklist
MAC Whitelisting Demo
Finding Other devices on the Network
Cloning a MAC Address
Wrapping Up
Endscreen
Taught by
SecurityFWD