Owning the Routing Table - Part II

Owning the Routing Table - Part II

Black Hat via YouTube Direct link

Who is vulnerable?

3 of 15

3 of 15

Who is vulnerable?

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Owning the Routing Table - Part II

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Introductions
  3. 3 Who is vulnerable?
  4. 4 Internet Routing - The Big Picture
  5. 5 OSPF Illustration
  6. 6 OSPF Primer (cont.)
  7. 7 The Attacker
  8. 8 OSPF Security Strengths
  9. 9 Owning the Routing Table - Part 1
  10. 10 The New Attack
  11. 11 Background (cont.)
  12. 12 The Basic Vulnerability
  13. 13 Ambiguity (cont.)
  14. 14 Validation on Cisco (cont.)
  15. 15 Attack Application Example #2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.