Главная
Study mode:
on
1
Intro
2
About Len Noe
3
The Art of War
4
MouthChecking
5
Scenario
6
Evil made attacks
7
Captive portals
8
Dropping business cards
9
Attack scenario
10
Overview
11
QR code
12
Captive portal
13
Zap proxy
14
Slide decks
15
Secondary VPN
16
Security conscious
17
responder
18
mobile attack scenario
19
physical attack scenario
20
corporate security
21
simple redirects
22
DNS spoof
23
Keyboard trap
24
Keyboard steal
25
Every keystroke
26
clipboard
27
psycho cat
28
I can extricate data
29
Take control
30
Pcap
31
Command Injection
32
Full Screen Capture
33
WHID Cactus
34
Tiny CC
Description:
Explore a conference talk from GrrCON 2019 that delves into the additional risks businesses face in public spaces. Learn about various attack scenarios, including captive portals, QR code exploits, and keyboard traps. Discover how attackers can leverage simple redirects, DNS spoofing, and command injection to compromise corporate security. Gain insights into physical and mobile attack vectors, and understand the importance of security consciousness in public environments. Examine tools like Zap proxy and WHID Cactus, and their potential for data exfiltration and system control. Understand the implications of full screen capture and clipboard manipulation in public settings.

Understanding How Public Places Introduce Additional Risks to Business - Len Noe

Add to list
0:00 / 0:00