Threat Modelling and Beyond for Cisco ACI
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore advanced threat modeling techniques and security considerations for Cisco Application Centric Infrastructure (ACI) in this comprehensive conference talk. Delve into the physical layout, essential background knowledge, and architectural components of ACI. Learn about critical security aspects, including the ACI filter mechanism bypass, VTEP spoofing, and switch compromise. Examine challenge-response functionality, device packages, and the OpFlex control protocol. Gain valuable insights into potential vulnerabilities and discover effective strategies to enhance the security posture of your ACI environment. Conclude with a discussion on next steps for implementing robust threat modeling practices in Cisco ACI deployments.
Syllabus
Intro
Agenda
Physical Layout 1/2
Background Knowledge
Certificates
Architecture 12/21
Short recap STRIDE
ACI Filter Mechanism Bypass
VTEP Spoofing
Switch Compromise
Some Challenge Response Functionality
Device Packages
OpFlex Control Protocol
Next Steps
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube