Stealing with BGP
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the intricacies of BGP (Border Gateway Protocol) exploitation in this Black Hat Europe 2003 conference talk presented by Stephen Dugan. Delve into the vulnerabilities of BGP and learn how malicious actors can manipulate this critical internet routing protocol for nefarious purposes. Gain insights into potential attack vectors, their implications on network security, and strategies to protect against BGP-based threats. Understand the technical aspects of BGP operations and how they can be leveraged for unauthorized access or data theft. Discover real-world examples and case studies that highlight the importance of securing BGP implementations in modern network infrastructures.
Syllabus
Black Hat EU 2003 - $tea£ing with BGP
Taught by
Black Hat
Related Courses
An Introduction to Computer NetworksStanford University via Independent Computer Networks
University of Washington via Coursera Computer Networking
Georgia Institute of Technology via Udacity Cybersecurity and Its Ten Domains
University System of Georgia via Coursera Model Building and Validation
AT&T via Udacity