YoVDO

Exploiting First Hop Protocols to Own the Network

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses Multicast Courses Spanning Tree Protocol Courses

Course Description

Overview

Explore techniques for exploiting first hop protocols to gain network control in this 41-minute conference talk from Derbycon 2016. Delve into topics including Cisco Discovery Protocol for reconnaissance, attacking and securing multicast, Spanning Tree Protocol attacks, VLAN hopping methods, VLAN Trunking Protocol security, broadcast storms, and vulnerabilities in First Hop Redundancy Protocols. Learn about DMZ Layer 2 security and secure visualization techniques for Layer 2 networks. Gain insights into network vulnerabilities and mitigation strategies through practical examples and references provided.

Syllabus

Intro
Cisco Discovery Protocol (CDP) - Great for Recon!
Multicast Overview
Attacking Multicast
Securing Multicast
Spanning Tree Protocol - Attack
VLAN Hopping - Dynamic Trunking Protocol
VLAN Hopping - Double VLAN Tag
VLAN Trunking Protocol (VTP) - Security
Broadcast Storms
First Hop Redundancy Protocols
VRRP - Clear Text Authentication
FHRP - Crafted HSRP Packets
DMZ Layer 2 Security
Layer 2 - Secure Visualization and Instrumentation
References


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube