In association with BSides Tampa 2017
Packet Tradecraft Level 1: OSI Foundation & Hijacking of Control Protocols
Friday, February 10, 2017
South University
4401 North Himes Avenue Suite 175, Tampa, FL 33614
8:00 AM till 5:00 PM
Fee : $100
Presented by:
Ryan Lindfield,
Exploitation of the network infrastructure is the holy grail of hacking when you consider all systems are less functional without the network, and subject to the will of network protocols. When exploited properly, no system is safe, because everything has to touch the wire.
Description:
The modern computer was designed for warfare, we’ve seen rapid innovation of offensive and defensive capabilities, and it seems to be accelerating. Like any participant in conflict, natural or artificial, a single unit has limitations and gains strength by leveraging peers. After thousands of years of conflict, the old saying remains true “ strength in numbers”. People and computers are both dependent upon network communication, especially in times of conflict. Whether it’s a coordinated attack, distributed resources, or centralized data analytics. The disruption or hijacking of a communication infrastructure can render the actors in any theater inoperable, as the command and control cannot communicate it’s will, nor receive feedback from agents or sensors.
Networks remain the soft underbelly of this technical revolution, from transportation, to banking, data centers, to desktops, to smartphones. Regardless of capacity, none of this stuff is much fun without a network. In this day of technical exploration we’ll showcase details of common protocols that are poorly understood. We’ll work to quickly bring everyone up to speed on the operation of network protocols, this foundation will serve you well for years to come. With this refreshed understanding of networking, we’ll take a deeper look into how the mechanisms can be exploited in most networks globally. We’ll learn how carefully swapping a specific 1 or 0 in a data stream, can redirect the information to the location of our choosing.
Exploitation techniques against standards based protocols ensures that these attacks are effective against all operating systems and vendors.
Attendees will learn to hijack the control flow of data, allowing them to inspect, modify and disrupt the transmissions of others. We’ll begin with simple attacks will have local effects and escalate complex yet practical techniques that could have global significance.
Desiree will start the day taking the students from web browsing, to DNS, clarifying concepts like anycast, while showcasing some inherent vulnerabilities. She will illustrate differences in TCP/ UDP, ICMP, IPSec, GRE and OSPF, then dig into concepts like IPv4 and IPv6 routing tables, then go deeper into ARP, VLANs, tagging, switching and DHCP, and finally the wire (layer 1). After Lunch we will go from the ground up, begging with Layer 1 and eavesdropping options for they physical layer, we’ll then move into a wide range of Denial of Service, interception and hijacking techniques.
Network Technologies:
DNS / TCP / UDP/ OSPF/ GRE / DHCP / IPv6 / IPv4 / 802.1Q / ARP / Switching / Routing
Network Exploitation Techniques:
Rogue DHCP, Rogue DNS, Root Bridge, Route poisoning, ARP poisoning, VTP poisoning, MAC flooding, MAC Spoofing, HSRP Hijacking and more.
Class will consist of lecture, labs, packet captures, and prizes.
100% Money back, satisfaction guaranteed
All proceeds will be donated to Boy Scouts of America, Oldsmar Troop 64