Главная
Study mode:
on
1
Intro
2
Initial Access
3
Policy Routing
4
sniffing networks
5
ipv6 and ipv4
6
L2 TPV3
7
Lawful Intercept
8
DHCP snooping
9
lawful intercept attack
10
critical infrastructure
11
packet analyzer
12
lowhanging fruit
13
BGP
14
What could someone do
15
IP Prefix
16
Conclusion
Description:
Explore advanced network manipulation techniques in this 45-minute conference talk from ShowMeCon. Delve into topics such as policy routing, network sniffing, IPv6 and IPv4 protocols, L2 TPV3, lawful intercept, and DHCP snooping. Learn about potential vulnerabilities in critical infrastructure, packet analysis, and BGP manipulation. Gain insights into IP prefix strategies and understand the implications of these techniques for network security and management.

Bending and Twisting Networks - Exploiting Vulnerabilities in Routing and Infrastructure

Add to list
0:00 / 0:00