Главная
Study mode:
on
1
Intro
2
Cisco Discovery Protocol (CDP) - Great for Recon!
3
Multicast Overview
4
Attacking Multicast
5
Securing Multicast
6
Spanning Tree Protocol - Attack
7
VLAN Hopping - Dynamic Trunking Protocol
8
VLAN Hopping - Double VLAN Tag
9
VLAN Trunking Protocol (VTP) - Security
10
Broadcast Storms
11
First Hop Redundancy Protocols
12
VRRP - Clear Text Authentication
13
FHRP - Crafted HSRP Packets
14
DMZ Layer 2 Security
15
Layer 2 - Secure Visualization and Instrumentation
16
References
Description:
Explore techniques for exploiting first hop protocols to gain network control in this 41-minute conference talk from Derbycon 2016. Delve into topics including Cisco Discovery Protocol for reconnaissance, attacking and securing multicast, Spanning Tree Protocol attacks, VLAN hopping methods, VLAN Trunking Protocol security, broadcast storms, and vulnerabilities in First Hop Redundancy Protocols. Learn about DMZ Layer 2 security and secure visualization techniques for Layer 2 networks. Gain insights into network vulnerabilities and mitigation strategies through practical examples and references provided.

Exploiting First Hop Protocols to Own the Network

Add to list