Takaisin

Hacking network infrastructure

Routing protocols form the core functions of all IP networks. Their proper operation ensures the correct and uninterrupted traffic flow. The course consists of alternating hands-on and lecture sessions. This course is valid to all those who are interested to learn to protect network infrastructure.

All participants must have a working knowledge and hands-on experience on BGP, OSPF, IPv6 and multicast. This course is not an introduction/basic level course to any of the aforementioned technologies.

The practise environment is based on Cisco IOS and Kali Linux and therefore fluent Cisco IOS -experience and basic Linux skills are highly recommended.

Lectures in Finnish, materials in English

Introduction to hacking
• Hacking in general
• Goals of hacking the infrastructure
• Hacking challenges
• Infrastructure protection mechanisms
• Cracking MD5


Hacking BGP
• Purpose of BGP
• BGP connectivity options
• Routing policy tools in BGP
• BGP modes of operatios• BGP vulnerabilities
• Attack vectors and tools
• BGP defences: Router hardening, Authentication, BGP TTL check, route filtering, Route Flap Dampening
• Exercises: Traffic attractors, directors, prefix-lists

Hacking OSPF
• Link-state routing
• OSPF basics
• OSPF strengths and vulnerabilities
• Attack vectors and tools
• OSPF defences: Router hardening, authentication, using IPSec in OSPFv3
• Exercise: OSPF neighborship formation, LSA-advertising Hacking IPv6
• IPv6 basics
• IPv6 key issues: addressing and LAN operations
• ICMPv6 weakness analysis
• ICMPv6 attack vectors and tools
• ICMPv6 defences
• Exercises: THC-toolkit in Kali/Linux

Multicast: technology and security issues
• Multicast basics, functional elements
• Multicast in LAN, IGMP and MLD
• Multicast in routed environments, PIM-SM, PIM-SSM'
• Multicast security
• Optional exercises

Näytä lisää Sulje
Mika Ilvesmäki
Mika Ilvesmäki kouluttava konsultti Tämä sähköpostiosoite on suojattu spamboteilta. Tarvitset JavaScript-tuen nähdäksesi sen.

CCNP, CCDP
Käytännön ja teorian yhteen sitova kouluttaja. Ydinosaaminen: L2/L3 –tekniikat ja Cisco- ympäristöt.
Opiskelut: TkT

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.