Главная
Study mode:
on
1
Intro
2
Getting shells into routers
3
Policy routing
4
GRE tunneling
5
ER Span
6
DLSW
7
ipv6 vs ipv4
8
l2tpv
9
Layer 2 security
10
Lawful intercept
11
DHCP snooping
12
OSPF
13
Rules of Engagement
14
BGP
15
Physical access rules
16
BGP hijacking
17
Trust relationships
18
Monitoring prefixes
19
Protocol tools
20
Router culture
Description:
Explore advanced network security concepts in this 57-minute conference talk from BSides Nashville 2014. Delve into topics such as router shell access, policy routing, GRE tunneling, ER Span, DLSW, IPv6 vs IPv4, L2TPv, layer 2 security, lawful intercept, DHCP snooping, OSPF, rules of engagement, BGP, physical access rules, BGP hijacking, trust relationships, monitoring prefixes, protocol tools, and router culture. Gain insights into bending and twisting networks to enhance security measures and understand potential vulnerabilities.

Bending and Twisting Networks: Advanced Router Techniques - Session 300

Add to list