{"code":"RNZD3W","speakers":[{"code":"CFESVA","name":"Michael Kafka","biography":"Michael \"MiKa\" Kafka\r\n\r\nMiKa started with networking in the mid 80ies, and in the early 90ies\r\nhe began to work with Firewalls and Encryption devices. Since 1997 he is\r\nCertified Cisco Systems Instructor for Routing, Switching and Security\r\nTopics. He is currently teaching network and security topics, working on\r\nnetwork projects and conducts network pentests ans audits.","avatar":null}],"title":"Network Attacks for Red Teams and Blue Teams","submission_type":"Talk","track":{"en":"Conference Hall"},"state":"confirmed","abstract":"Security features for network functions are not commonly deployed on\r\ntypical installations. This allows attackers to freely move around in a\r\nnetwork once a single point was compromised. Weak network security\r\nenables Lateral movement of an adversary and can also be exploited by\r\nRed Teams.\r\n\r\nThe Talk starts with a brief discussion of network functions on Layer 2\r\nand 3 and gives a brief history of famous malware families and campaigns\r\nwhich were used in the past. Also we will define the goal of network\r\nattacks.\r\n\r\nThen we discuss several techniques like ARP/ND spoofing/poisoning, MAC\r\nflooding, attacks on FHRP like VRRP or HSRP, UPNP, route injection and\r\nIP source route and more. We will show how these attacks are conducted,\r\nwhat we can achieve and also how to deploy countermeasures for mitigation.","description":"","duration":30,"slot_count":1,"do_not_record":false,"is_featured":false,"content_locale":"en","slot":{"room":{"en":"Dachsaal"},"start":"2019-11-30T16:15:00+01:00","end":"2019-11-30T16:45:00+01:00"},"image":null,"resources":[]}