Completed
Attack Application Example #2
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Owning the Routing Table - Part II
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Introductions
- 3 Who is vulnerable?
- 4 Internet Routing - The Big Picture
- 5 OSPF Illustration
- 6 OSPF Primer (cont.)
- 7 The Attacker
- 8 OSPF Security Strengths
- 9 Owning the Routing Table - Part 1
- 10 The New Attack
- 11 Background (cont.)
- 12 The Basic Vulnerability
- 13 Ambiguity (cont.)
- 14 Validation on Cisco (cont.)
- 15 Attack Application Example #2