У нас вы можете посмотреть бесплатно ScapyCon 24 - Implementing and Testing Layer 2 Firewall Rules with Scapy - Francisco Cotrina или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this talk Francisco explains how he is using Scapy to validate Firewall rules. About dissecto: Founded in 2022, by the maintainers and primary contributors to “Automotive Scapy“, a widely embraced packet manipulation tool in the automotive industry, dissecto specializes in simplifying cybersecurity testing for embedded systems. Our flagship product, dissecto HydraVision, is an automated security test environment for electrical control units (ECUs), that detects and reports vulnerabilities. Alongside, we provide security training, pentesting and advanced hardware solutions like the dissecto HydraLink interface. Find out more: www.dissecto.com About ScapyCon: ScapyCon Automotive 2024 was a two-day event focused on network packet manipulation, attracting 75 participants. Held on September 18-19 at Techbase Regensburg, it featured 10 expert speakers and 3 hands-on workshops, covering applications from automotive to IoT and aviation. Attendees explored advanced capabilities of Scapy, the premier Python tool for packet manipulation. About HydraVision: HydraVision is a platform as a service that enables automated security testing over the entire lifecycle of an ECU and ensures compliance with the latest industry-specific guidelines and standards such as UNECE R155 and ISO 21434. With our intelligent security test environment, manufacturers and suppliers can not only easily comply with the new directives and standards, but also carry out practical cybersecurity tests on their products – automatically and remotely. We proactively develop test cases for new threats (CVEs) reported by developers, dissecto Research or third parties such as Auto-ISAC or ASRG. This allows attack vectors against your system to be verified and validated in a timely manner. In addition, you gain full control and transparency over all components of the platform in order to review and audit them and to design your work process as individually as possible. Learn more: https://dissec.to/dissecto-hydravision/