Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Owning the Routing Table - Part II

Black Hat via YouTube

Overview

Explore an advanced OSPF attack that exploits a newly discovered protocol ambiguity, allowing an attacker to control routing tables across an entire autonomous system. Dive into the technical details of this powerful routing attack, presented at Black Hat USA 2013 as a sequel to the 2011 "Owning the Routing Table" talk. Learn about the vulnerability's impact on major router vendors, potential exploit scenarios including black holes and network cuts, and ongoing multi-vendor efforts to address this security issue. Gain insights into Internet routing, OSPF fundamentals, and the attacker's perspective through detailed illustrations and real-world examples. Understand the implications for network security and discover how a single compromised router can lead to widespread routing table manipulation.

Syllabus

Intro
Introductions
Who is vulnerable?
Internet Routing - The Big Picture
OSPF Illustration
OSPF Primer (cont.)
The Attacker
OSPF Security Strengths
Owning the Routing Table - Part 1
The New Attack
Background (cont.)
The Basic Vulnerability
Ambiguity (cont.)
Validation on Cisco (cont.)
Attack Application Example #2

Taught by

Black Hat

Reviews

Start your review of Owning the Routing Table - Part II

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.