A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Paul Coggin: (@paulcoggin): Bending and Twisting Networks (BSides Nashville 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

Paul Coggin: (@paulcoggin): Bending and Twisting Networks
BSides Nashville 2014
http://bsidesnash.org

Learn about network attack vectors that an adversary can use to control, and influence network traffic flows and exfiltrate data by exploiting network devices and protocols in the LAN, WAN and Cloud. Defensive methods and techniques for monitoring and protecting against the outlined attack vectors will be discussed. This presentation explores advanced methods and techniques that penetration testers, network engineers and security auditors need to understand about network infrastructure and protocols.

    Strategies for attacking network infrastructure
    Undocumented method for tunneling IPv6
    Layer 3 LAN based MITM attack
    Methods for exfiltrating data from the core network infrastructure including MPLS core network infrastructure
    Router tricks that penetration testers need to know
    Often over looked network trust relationships, integration, dependencies and interdependencies
    Features hackers know about routers that need to be understood by auditors and network administrators.
    Switch security the Achilles heel of networks everywhere and what to do about it.
    Ensure that you know when someone is twisting and bending your network infrastructure to suit their purposes
    Advanced service provider technologies that be utilized by an attacker to enable data exfiltration and WAN based
    MITM attack vectors, manipulate and override routing paths
	

Back to BSides Nashville 2014 list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast