conference logo

Playlist "23C3: Who can you trust?"

Router and Infrastructure Hacking

Raven

The security of backbone devices has been under increasing focus for the past few years, but infrastructure hacking techniques remain in
their infancy and are still not even used in most penetration tests.
This talk will discuss how to find and exploit vulnerabilities in infrastructure devices and their service dependencies, including vulnerability development as necessary.