Owning the Routing Table - Part II
Offered By: Black Hat via YouTube
Course Description
Overview
Explore an advanced OSPF attack that exploits a newly discovered protocol ambiguity, allowing an attacker to control routing tables across an entire autonomous system. Dive into the technical details of this powerful routing attack, presented at Black Hat USA 2013 as a sequel to the 2011 "Owning the Routing Table" talk. Learn about the vulnerability's impact on major router vendors, potential exploit scenarios including black holes and network cuts, and ongoing multi-vendor efforts to address this security issue. Gain insights into Internet routing, OSPF fundamentals, and the attacker's perspective through detailed illustrations and real-world examples. Understand the implications for network security and discover how a single compromised router can lead to widespread routing table manipulation.
Syllabus
Intro
Introductions
Who is vulnerable?
Internet Routing - The Big Picture
OSPF Illustration
OSPF Primer (cont.)
The Attacker
OSPF Security Strengths
Owning the Routing Table - Part 1
The New Attack
Background (cont.)
The Basic Vulnerability
Ambiguity (cont.)
Validation on Cisco (cont.)
Attack Application Example #2
Taught by
Black Hat
Related Courses
Underactuated RoboticsMassachusetts Institute of Technology via edX Computer Systems Design for Energy Efficiency
Chalmers University of Technology via edX Differential Equations: 2x2 Systems
Massachusetts Institute of Technology via edX Decision-Making for Autonomous Systems
Chalmers University of Technology via edX Drones and Autonomous Systems I: Fundamentals
University System of Maryland via edX