Advanced Network Attacks: Layer 2/3 Dominance
Forget volumetric DDoS. The real damage happens inside the perimeter. We explore IPv6 shadow networks, NAC bypasses, and VLAN hopping techniques for the modern Red Team.
Forget volumetric DDoS. The real damage happens inside the perimeter. We explore IPv6 shadow networks, NAC bypasses, and VLAN hopping techniques for the modern Red Team.