ekoparty Security Conference

Wednesday, October 21, 2015 22 months ago Buenos Aires, Argentina

MWR Labs will be presenting all-new research on MPLS networks at the ekoparty Security Conference in Buenos Aires this year.

Calendar

MWR is delighted to announce that Georgi Geshev will be presenting at ekoparty. This will take place between 21st – 23rd October 2015 at Ciudad Cultural Konex, Argentina.

ekoparty takes place annually in the Autonomous City of Buenos Aires. In this event, attendees, guests, specialists and references on the subject from all around the world, have the opportunity to engage with the latest technological innovations, vulnerabilities and tools, in a relaxed environment of knowledge sharing.

The idea of holding an event with these characteristics arose in the underground circuit of IT, but over the editions, positioned itself as the largest and most prestigious security technical conference in Latin America. As well as having relevance at an international level and a broad technical audience, the ekoparty offers training taught by the most recognised professionals in the market.

Talks presented by MWR

Topic: Warranty Void if Label Removed – Attacking MPLS Networks

Speaker: Georgi Geshev

Abstract

Multiprotocol Label Switching (MPLS) is certainly the most prevalent service provider technology used by major players to build and offer highly scalable value-added services allowing reliable transport of data and latency-sensitive traffic like voice and video. It turns out MPLS has remained largely unexplored by the security community and very little security research has ever been done in this area.

This talk will be a walk-through of research findings from assessing multiple MPLS implementations and the various key weaknesses that were found to affect a number of leading vendors. General MPLS and MPLS related terms and concepts will be briefly introduced to the audience, followed by an overview of a typical service provider network, classic topologies and basic traffic engineering strategies. Several network reconnaissance techniques will be presented that allow an adversary to partially or, in some cases, fully reveal the MPLS backbone Label Switching Router (LSR) interconnections by leaking internal LSR IP addresses. The attack scenarios against service provider infrastructure will then be followed by attacks on customers of the MPLS domain. It should be noted that none of the examples and demonstrations require access to the MPLS backbone, i.e. attacks are executed from the perspective of a client of the MPLS domain. This talk will be concluded with both general and, where applicable, vendor specific best practices and recommendations on reducing the attack surface of an MPLS network.

You can register for tickets to ekoparty here.

 

 

Accreditations

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 14001 in the UK, an internationally accepted standard that outlines how to put an effective environmental management system in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by CESG for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.