Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities and exploitation techniques of load balancers in this 39-minute conference talk from BruCON Security Conference. Delve into the world of high-profile remote code execution vulnerabilities affecting these critical networking devices, which are widely used by major corporations, ISPs, and cloud providers. Learn about the architecture, operation, and deployment of load balancers, as well as their management plane and the access it provides post-breach. Gain insights into avoiding common mistakes that can trigger device failures or reveal your presence on the system. While focusing on a specific architecture, discover how this knowledge can be applied across various load balancing platforms. Benefit from both offensive and defensive perspectives, as the information provided can be used to enhance security measures and guide digital forensics and incident response operations.