All Your Packets Are Belong to Us – Attacking Backbone Technologies

April 22, 2009 (at 3:30 p.m.) in

The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We will continue down that road and discuss potential and real vulnerabilities in backbone technologies used in today’s carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS traffic on a site level and some Carrier Ethernet stuff) all of which will be performed with a new tool kit made available at the con. It’s about making the theoretical practical, once more!

Daniel Mende

Daniel Mende is a German security researcher with ERNW GmbH and specializes in network protocols and technologies. He is well known for his Layer2 extensions of the SPIKE and Sulley fuzzing frameworks. He has also discussed new ways of building botnets and presented on protocol security at many occasions including Troopers, ShmooCon and Black Hat. He has written several tools for assessment of telecommunication networks like Pytacle, GTP-Scan, Dizzy and APNBF.

Simon Rich

Simon Rich is a German security researcher specialized on network protocols and technologies. He has contributed to finding several protocol flaws in the past and is known for innovative approaches to (depending who’s the customer) implementing or breaking the security of technologies. He is also well known for his Layer2 extensions of the SPIKE and Sulley fuzzing frameworks and have presented on protocol security at many occasions including CCC Easterhegg, Daycon, IT Underground and Troopers08.