Bending and Twisting Networks - Exploiting Vulnerabilities in Routing and Infrastructure
Offered By: YouTube
Course Description
Overview
Explore advanced network manipulation techniques in this 45-minute conference talk from ShowMeCon. Delve into topics such as policy routing, network sniffing, IPv6 and IPv4 protocols, L2 TPV3, lawful intercept, and DHCP snooping. Learn about potential vulnerabilities in critical infrastructure, packet analysis, and BGP manipulation. Gain insights into IP prefix strategies and understand the implications of these techniques for network security and management.
Syllabus
Intro
Initial Access
Policy Routing
sniffing networks
ipv6 and ipv4
L2 TPV3
Lawful Intercept
DHCP snooping
lawful intercept attack
critical infrastructure
packet analyzer
lowhanging fruit
BGP
What could someone do
IP Prefix
Conclusion
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity