CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
Description:
Explore five zero-day vulnerabilities discovered in proprietary layer 2 protocols and their severe implications for device and network security. Delve into the attack surface exposed by these protocols and understand how they can be exploited. Learn from security researchers Barak Hadad and Ben Seri as they present their findings in this 37-minute Black Hat conference talk. Gain insights into the potential risks facing enterprise networks and devices, and understand the importance of addressing these hidden bugs. Access the full abstract and presentation materials for a comprehensive overview of the CDPwn vulnerabilities and their impact on millions of enterprise devices.
CDPwn - Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days