EXPLOITING NETWORK DEVICES
By Kylie McDevitt
What if someone unplugs your printer and plugs in their laptop running Kali? What does your network tell the attacker from within? End clients or servers can provide weak entry points to your network but the intrinsic pipes that connect these devices are also vulnerable to attacks. This training looks at some common misconfigurations of network devices, some inherently weak protocols and discusses how they can be compromised and how to mitigate against these compromises.
The course will cover the following topics:
Networking 101 refresher
SNMP enumeration and exploitation
MAC flooding & spoofing
Spanning Tree (STP) Attacks
Other network topics if time permits
In each topic, the students will be given an overview on how the protocol works, common vulnerabilities, and hands-on labs showing how they are exploited and how to mitigate against these.
Who will benefit from the course?
This course will provide a better understanding of securing network devices. This is ideally suited to networking professionals and security engineers.
Exploiting Network Devices & Protocols is considered to be intermediate
Students should come with a laptop capable of RDP and SSH.
A basic understanding of how computers and networks work is required.
Some experience with Linux and an understanding of TCP/IP would be beneficial.
About the Trainer
Kylie McDevitt is a Technical Director in Emerging Technology and Engineering with the ACSC, part of ASD. Kylie graduated from ANU with a Bachelor of Engineering and worked for Australia’s largest Telco as a radio engineer in MobileNet before moving into computer security, where she has been for the last 11 years. She has a Masters in Computer Networking as well as multiple industry certifications. Kylie is a casual lecturer at UNSW Canberra and spends her free time organising community events such as BSides Canberra and the CSides monthly security meets.