Wednesday, November 11, 2015 19 months ago ,
MWR Labs' Georgi Geshev will be presenting research on MPLS networks at PacSec in Tokyo this November.
MWR is delighted to announce that Georgi Geshev will be presenting at PacSec this year on Thursday 12th November at Aoyama Diamond Hall, Tokyo.
PacSec aims to address the increasing importance of information security in Japan, the best known figures in the international security industry will get together with leading Japanese researchers to share best practices and technology. The most significant new discoveries about computer network hack attacks will be presented for discussion at the annual PacSec conference.
The PacSec meeting provides an opportunity for foreign specialists to be exposed to Japanese innovation and markets and collaborate on practical solutions to computer security issues. In a relaxed setting with a mixture of material bilingually translated in both English and Japanese, the eminent technologists can socialize and attend training sessions.
The presenters are experienced security professionals at the vanguard of leading information security technology as well as experienced instructors who have prepared tutorials intended to help you stay abreast of the latest developments in this rapidly moving technological field. The best, and brightest, have assembled unique new material to help you maintain your technological leadership – which they will present at this conference.
Topic: Warranty Void if Label Removed – Attacking MPLS Networks
Speaker: Georgi Geshev
General MPLS and MPLS related concepts will be briefly introduced to the audience, followed by an overview of a typical service provider network, classic topologies and basic traffic engineering strategies.
Several network reconnaissance techniques will be presented that allow an adversary to partially or, in some cases, fully reveal the MPLS backbone Label Switching Router (LSR) interconnections by leaking internal LSR IP addresses. Furthermore, certain vendor implementations were found to allow traffic to be sent directly to LSR IP addresses, which is again something that should be mitigated given their implementation follows the protocol specification.
The attack scenario against service provider infrastructure will then be followed by a walk-through of an attack against customers of the same shared MPLS environment. The concept of Virtual Routing and Forwarding (VRF) will be explained further for the purpose of defining what is merely known as VRF hopping attacks. Again, several vendors were found to be susceptible to these kind of attacks that allow for performing what can be described as VLAN hopping in the context of MPLS. In summary, successfully executing a VRF hopping attack allows for breaking out of our own VRF and injecting traffic into another customer’s VRF.
You can register for tickets to PacSec here.