Bending and Twisting Networks

Presented at DeepSec 2014 „Do you want to know more?“, Unknown date/time (Unknown duration)

Learn about network attack vectors that an adversary can use to control, and influence network traffic flows and exfiltrate data by exploiting network devices and protocols in the LAN, WAN and Cloud. Defensive methods and techniques for monitoring and protecting against the outlined attack vectors will be discussed. This presentation explores advanced methods and techniques that penetration testers, network engineers and security auditors need to understand about network infrastructure and protocols. Strategies for attacking network infrastructure Undocumented method for tunneling IPv6 Layer 3 LAN based MITM attack Methods for exfiltrating data from the core network infrastructure including MPLS core network infrastructure Router tricks that penetration testers need to know Often over looked network trust relationships, integration, dependencies and interdependencies Features hackers know about routers that need to be understood by auditors and network administrators. Switch security the Achilles heel of networks everywhere and what to do about it. Ensure that you know when someone is twisting and bending your network infrastructure to suit their purposes Advanced service provider technologies that be utilized by an attacker to enable data exfiltration and WAN based MITM attack vectors, manipulate and override routing paths

Presenters:

  • Paul Coggin - Dynetics, Inc
    Paul Coggin is an internetwork consulting solutions architect with Dynetics, a Huntsville, Ala.-based mid-tier company that provides complete lifecycle analysis, engineering, information technology and hardware solutions to support customer missions. Coggin is responsible for architecting and securing large complex tactical, critical infrastructure and service provider networks. His expertise includes tactical, service provider and ICS\SCADA network infrastructure hacker attacks, and defenses, as well as large complex network design and implementation. His experience includes leading network architecture reviews, vulnerability analysis, and penetration testing engagements for critical infrastructure and tactical networks. Coggin is a frequent speaker on cyber security offense and defense issues related to service provider and critical infrastructure. He has presented at conferences around the world. He is a Cisco Systems Certified Instructor #32230, Certified EC-Council Instructor, and certified SCADA security architect. He has a bachelor's degree in mathematics, a master's in Computer Information Systems and second MS in information assurance and security. He is currently pursuing a masters degree in systems management In addition, he holds a wide array of certifications from Cisco, EC Council, ISC^2 and other computer security organizations.

Links:

Similar Presentations: