Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore pentesting techniques for network layers 2 and 3 in this conference talk from BSides Cleveland 2014. Dive into various network protocols and attack vectors, including CDP attacks, DHCP exploits, and routing protocol vulnerabilities. Learn about defense mechanisms like DHCP snooping and dynamic trunking protocol. Discover tools such as Puppetscape II, voidpopper, and Sheena for network exploitation. Witness a live demo showcasing router manipulation, DNS spoofing, and packet analysis. Gain insights into establishing effective working relationships in the cybersecurity field and understand the importance of defending against BGP attacks.
Syllabus
Introduction
Art Defenses
Discovery Protocol
CDP Attacks
Voice VLAN
DHCP
Default Gateway
DHCP snooping
Dynamic trunking protocol
HSSRP and VRRP
Primary Router
Spanning Tree
Loops
Routing protocols
What can you do with it
What do we do
Defending against BGP
Working relationship with Kevin
Puppet
scape II
voidpopper
Sheena
ASS
Loki
Obe
Platform
OpenWRT
Storage
Exploit Chain
DNS Spoof
Demo
Routers
Network topology
Packet counts
ScapeE
UDP
Launch Attack
Active Router
Phone
Conclusions