Exploiting First Hop Protocols to Own the Network

Presented at DerbyCon 6.0 Recharge (2016), Sept. 23, 2016, 6 p.m. (50 minutes).

This talk will focus on how to exploit a network by targeting the various first hop protocols. Attack vectors for crafting custom packets as well a few of the available tools for layer 2 network protocols exploitation will be covered. Defensive mitigations and recommendations for adding secure visualization and instrumentation for layer 2 will be provided.

Presenters:

Similar Presentations: