Главная
Study mode:
on
1
Intro
2
Publication History of this Research
3
Road Map
4
Key Question
5
Consequences
6
Test Scenarios & Results
7
Old Hardware Specs
8
New Hardware Specs
9
VLAN Hopping Attacks
10
Virtual LAN Tag
11
Switch Spoofing Demo (VMWare ESXi 6.0)
12
Switch Spoofing Results
13
Double-Tagging Demo (Two Physical Switches)
14
Double-Tagging Demo (Two Virtual Switches w/ a Cisco 2950 in the Middle)
15
Double-Tagging Demo (One Physical Switch)
16
Double Tagging Results
17
Address Resolution Protocol
18
ARP Process
19
ARP Spoofing Results
20
ARP Spoofing Mitigation
21
Conclusion: Virtual vs Physical?
Description:
Explore VLAN hopping, ARP poisoning, and Man-in-the-Middle attacks in virtualized environments through this comprehensive conference talk from ANYCon 2017. Delve into the publication history of the research, key questions, and potential consequences. Examine various test scenarios and results using both old and new hardware specifications. Witness demonstrations of VLAN hopping attacks, including switch spoofing and double-tagging, across different network configurations. Gain insights into the Address Resolution Protocol (ARP) process, ARP spoofing results, and mitigation strategies. Conclude by comparing virtual and physical environments in terms of security vulnerabilities and countermeasures.

VLAN Hopping, ARP Poisoning, and Man In The Middle Attacks in Virtualized Environments

Add to list
0:00 / 0:00