Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an advanced OSPF attack that exploits a newly discovered protocol ambiguity, allowing an attacker to control routing tables across an entire autonomous system. Dive into the technical details of this powerful routing attack, presented at Black Hat USA 2013 as a sequel to the 2011 "Owning the Routing Table" talk. Learn about the vulnerability's impact on major router vendors, potential exploit scenarios including black holes and network cuts, and ongoing multi-vendor efforts to address this security issue. Gain insights into Internet routing, OSPF fundamentals, and the attacker's perspective through detailed illustrations and real-world examples. Understand the implications for network security and discover how a single compromised router can lead to widespread routing table manipulation.
Syllabus
Intro
Introductions
Who is vulnerable?
Internet Routing - The Big Picture
OSPF Illustration
OSPF Primer (cont.)
The Attacker
OSPF Security Strengths
Owning the Routing Table - Part 1
The New Attack
Background (cont.)
The Basic Vulnerability
Ambiguity (cont.)
Validation on Cisco (cont.)
Attack Application Example #2
Taught by
Black Hat