Главная
Study mode:
on
1
Introduction
2
Art Defenses
3
Discovery Protocol
4
CDP Attacks
5
Voice VLAN
6
DHCP
7
Default Gateway
8
DHCP snooping
9
Dynamic trunking protocol
10
HSSRP and VRRP
11
Primary Router
12
Spanning Tree
13
Loops
14
Routing protocols
15
What can you do with it
16
What do we do
17
Defending against BGP
18
Working relationship with Kevin
19
Puppet
20
scape II
21
voidpopper
22
Sheena
23
ASS
24
Loki
25
Obe
26
Platform
27
OpenWRT
28
Storage
29
Exploit Chain
30
DNS Spoof
31
Demo
32
Routers
33
Network topology
34
Packet counts
35
ScapeE
36
UDP
37
Launch Attack
38
Active Router
39
Phone
40
Conclusions
Description:
Explore pentesting techniques for network layers 2 and 3 in this conference talk from BSides Cleveland 2014. Dive into various network protocols and attack vectors, including CDP attacks, DHCP exploits, and routing protocol vulnerabilities. Learn about defense mechanisms like DHCP snooping and dynamic trunking protocol. Discover tools such as Puppetscape II, voidpopper, and Sheena for network exploitation. Witness a live demo showcasing router manipulation, DNS spoofing, and packet analysis. Gain insights into establishing effective working relationships in the cybersecurity field and understand the importance of defending against BGP attacks.

Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

Add to list