Exploiting First Hop Protocols to Own the Network

Presented at DeepSec 2016 „Ten“, Unknown date/time (Unknown duration)

This talk will focus on how to exploit a network by targeting the various first hop protocols. Attack vectors for crafting custom packets as well as a few of the available tools for layer 2 network protocols exploitation will be covered. Defensive mitigations and recommendations for adding secure visualization and instrumentation for layer 2 will be provided.


Presenters:

  • Paul Coggin - Representing self - No employer / affiliation to disclose
    Paul Coggin is an information Security Engineer. His expertise includes tactical, service provider and ICS\SCADA network infrastructure attacks and defenses as well as large complex network design and implementation. His experience includes leading network architecture reviews, vulnerability analysis and penetration testing engagements for critical infrastructure and tactical networks.

Links:

Similar Presentations: