“What can you do?” presented at Skydogcon 2016

by Cameron Maerz,

Summary : Wrecking networks with ease. An offensive review of layer 2, this ain't your grampa's poison. Exploring and exploiting networks by unforeseen means. Not only covering vectors, but also include instruction allowing for exploitation of applicable situations. Starting on layer 2, but not arp poisoning, gain (man in the middle), and the best part without any tools which are not already available to the root user of a Linux machine. Going beyond MITM, attacking relationships in networking stealing ports, & replacing content.