Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

via YouTube

Overview

Explore pentesting techniques for network layers 2 and 3 in this conference talk from BSides Cleveland 2014. Dive into various network protocols and attack vectors, including CDP attacks, DHCP exploits, and routing protocol vulnerabilities. Learn about defense mechanisms like DHCP snooping and dynamic trunking protocol. Discover tools such as Puppetscape II, voidpopper, and Sheena for network exploitation. Witness a live demo showcasing router manipulation, DNS spoofing, and packet analysis. Gain insights into establishing effective working relationships in the cybersecurity field and understand the importance of defending against BGP attacks.

Syllabus

Introduction
Art Defenses
Discovery Protocol
CDP Attacks
Voice VLAN
DHCP
Default Gateway
DHCP snooping
Dynamic trunking protocol
HSSRP and VRRP
Primary Router
Spanning Tree
Loops
Routing protocols
What can you do with it
What do we do
Defending against BGP
Working relationship with Kevin
Puppet
scape II
voidpopper
Sheena
ASS
Loki
Obe
Platform
OpenWRT
Storage
Exploit Chain
DNS Spoof
Demo
Routers
Network topology
Packet counts
ScapeE
UDP
Launch Attack
Active Router
Phone
Conclusions

Reviews

Start your review of Pentesting Layer 2 and Layer 3 Network Protocols - BSides Cleveland 2014

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.