PacSec 2015

Wednesday, November 11, 2015 4 years ago ,

MWR Labs' Georgi Geshev will be presenting research on MPLS networks at PacSec in Tokyo this November.

MWR is delighted to announce that Georgi Geshev will be presenting at PacSec this year on Thursday 12th November at Aoyama Diamond Hall, Tokyo.

PacSec aims to address the increasing importance of information security in Japan, the best known figures in the international security industry will get together with leading Japanese researchers to share best practices and technology. The most significant new discoveries about computer network hack attacks will be presented for discussion at the annual PacSec conference.

The PacSec meeting provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues. In a relaxed setting with a mixture of material bilingually translated in both English and Japanese, the eminent technologists can socialize and attend training sessions.

The presenters are experienced security professionals at the vanguard of leading information security technology as well as experienced instructors who have prepared tutorials intended to help you stay abreast of the latest developments in this rapidly moving technological field. The best, and brightest, have assembled unique new material to help you maintain your technological leadership – which they will present at this conference.

Talks presented by MWR

Topic: Warranty Void if Label Removed – Attacking MPLS Networks

Speaker: Georgi Geshev


General MPLS and MPLS related concepts will be briefly introduced to the audience, followed by an overview of a typical service provider network, classic topologies and basic traffic engineering strategies.

Several network reconnaissance techniques will be presented that allow an adversary to partially or, in some cases, fully reveal the MPLS backbone Label Switching Router (LSR) interconnections by leaking internal LSR IP addresses. Furthermore, certain vendor implementations were found to allow traffic to be sent directly to LSR IP addresses, which is again something that should be mitigated given their implementation follows the protocol specification.

The attack scenario against service provider infrastructure will then be followed by a walk-through of an attack against customers of the same shared MPLS environment. The concept of Virtual Routing and Forwarding (VRF) will be explained further for the purpose of defining what is merely known as VRF hopping attacks. Again, several vendors were found to be susceptible to these kind of attacks that allow for performing what can be described as VLAN hopping in the context of MPLS. In summary, successfully executing a VRF hopping attack allows for breaking out of our own VRF and injecting traffic into another customer’s VRF.

You can register for tickets to PacSec here.



Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.