Bending and Twisting Networks - Exploiting Vulnerabilities in Routing and Infrastructure
Offered By: YouTube
Course Description
Overview
Explore advanced network manipulation techniques in this 45-minute conference talk from ShowMeCon. Delve into topics such as policy routing, network sniffing, IPv6 and IPv4 protocols, L2 TPV3, lawful intercept, and DHCP snooping. Learn about potential vulnerabilities in critical infrastructure, packet analysis, and BGP manipulation. Gain insights into IP prefix strategies and understand the implications of these techniques for network security and management.
Syllabus
Intro
Initial Access
Policy Routing
sniffing networks
ipv6 and ipv4
L2 TPV3
Lawful Intercept
DHCP snooping
lawful intercept attack
critical infrastructure
packet analyzer
lowhanging fruit
BGP
What could someone do
IP Prefix
Conclusion
Related Courses
Cyber-Physical Systems SecurityGeorgia Institute of Technology via Udacity Challenges and solutions in Future Power Networks
EMMA ICS/SCADA Fundamentals
Cybrary Cybersecurity: Keeping the Lights On - Practical Challenges in Utilities - Keynote
New York University (NYU) via YouTube Dispelling the Top 10 Myths in Cybersecurity - AIG Cybersecurity Lecture
New York University (NYU) via YouTube