Overview
Explore the critical security implications of BGP hijacking in this Black Hat conference talk. Delve into the vulnerabilities of Internet routing and its impact on SSL/TLS PKI. Learn how BGP hijacking, often occurring due to route leaks and misconfigurations, can be exploited to compromise encrypted connections. Discover the intricacies of Internet infrastructure, including autonomous systems, DNS servers, and certificate authorities. Examine real-world examples of routing oddities and their consequences. Understand the limitations of current security measures and explore potential solutions to mitigate these risks. Gain insights into the complex interplay between Internet routing, encryption, and trust in the digital landscape.
Syllabus
Introduction
How the Internet works
Route Leak
Tracking oddities
What happens next
Speed of light
Preference
Commercial Relationships
Autonomous Systems
Obtaining TLS Certificate
How To Get A TLS Certificate
DNS Servers Are Loaded
Summary
Autonomous System
Local Hijacking
Work rounds
Certificate Patrol
Taught by
Black Hat