Mike Beekey ARP Vulnerabilities Indefensible Local Network Attacks

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=hKfmkKWz8wM



Duration: 1:03:01
9 views
1


Mike Beekey, Senior Manager - Deloitte & Touche
ARP Vulnerabilities: Indefensible Local Network Attacks?

ARP may be one of the most used, but least respected protocol allowing two devices to establish communications with each other across a network. Unfortunately, even with its critical role of mapping the logical address to physical address, ARP is inherently susceptible to a variety of spoofing attacks within local subnets. While there have been discussions surrounding this issue and tools written to take advantage of these features, its potential to cause nearly indefensible denial of service attacks with minimal effort, appears to still be understood by only a few.

This presentation assumes some familiarity with ARP and will only briefly review the basics. We will discuss the vulnerabilities and a variety of common attack tactics, such as turning your expensive network switch into a dumb hub, sniffing, and performing session hijacking. We will then discuss some more unfriendly techniques including preventing individuals from accessing network resources, stopping kiddies from performing network scans, and best or worst of all, bringing all local network connectivity to a complete halt. In addition, we will clear up some prevalent misconceptions about potential defenses and countermeasures, vulnerable systems and devices, and methods for detecting and reacting to these attacks. Lastly, we will discuss and demonstrate testing methods,exploit techniques, and countermeasures using several custom tools.

Mike is a senior manager at Deloitte & Touche and has been working in the computer security area for over eight years. Mike has extensive experience in performing manual penetration and vulnerability testing in a variety of environments. His particular of focus and interest is in network protocols, and ways to manipulate them for various attacks and abuse of network devices and IDS systems. Mike has worked as a consultant for a variety of commercial clients, as well as federal and civilian government agencies.

Black Hat - USA - 2001 Hacking conference
#hacking, #hackers, #infosec, #opsec, #ARP, #LAN







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
spy
programmer
program
spyware
hacking conference
conference
learn
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Mike Beekey