Not all sensible data is exposed on the Internet through the IP transport layer. Some particular data are transmitted using radio waves or frequencies that are needed for specific types of attacks for this new perimeter, much different considering our normal ethical hacker activities (we cannot use NMAP for example....
Author
Latest Articles
- BlogDecember 28, 2022Cybersecurity in Education: What Parents, Teachers, and Students Should Know in 2023
- BlogDecember 15, 2022Remembering Leonard Jacobs
- BlogSeptember 30, 2022VPN Security: A Pentester's Guide to VPN Vulnerabilities
- BlogAugust 9, 2022AppSec Tales II | Sign-in
Subscribe
Login
0 Comments