YoVDO

I Am Become Loadbalancer, Owner of Your Network

Offered By: NorthSec via YouTube

Tags

NorthSec Courses Cybersecurity Courses Network Architecture Courses Configuration Management Courses

Course Description

Overview

Explore the intricacies of load balancer architecture, operation, and deployment in this 31-minute NorthSec conference talk. Gain insights from a decade of experience with a prominent load balancing vendor, learning about management planes and post-breach access. Discover how to avoid common mistakes that can disrupt traffic processing or trigger device failures. While focusing on a specific architecture, apply the information across most platforms due to similar design concepts. Understand deployment methodologies, traffic planes, user accounts, firewall settings, and valuable configuration items. Learn about backdoors, web shells, and persistence techniques. Conclude with guidance on building a test lab to enhance your understanding and success in load balancer exploitation.

Syllabus

Intro
TL;DR-Load balancers
Deployment methodology & access
Traffic planes: Management & production
User accounts & firewall settings
Backdoors & web shells & persistence oh my!
Valuable configuration items (/config)
Building a test lab (you need this to be successful)


Taught by

NorthSec

Related Courses

The Risks of RDP and How to Mitigate Them
NorthSec via YouTube
Authentication Challenges in SaaS Integration and Cloud Transformation
NorthSec via YouTube
Building CANtact Pro - An Open Source CAN Bus Tool
NorthSec via YouTube
Unmasking the Chameleons of the Criminal Underground
NorthSec via YouTube
Bypassing Advanced Device Profiling with DHCP Packet Manipulation
NorthSec via YouTube