ARL Route Hijacking

Page 1

The U.S. Army Research Laboratory, Center for Cyber Analysis and Assessment presents:

Route Hijacking

Attackers exploit vulnerabilities in routing protocols to wreak havoc on networks by redirecting traffic, masquerading as services and users, and stealing credentials, among others. Participants will identify weaknesses in a mock-up scenario, execute exploits, and then incorporate defense mechanisms - all in a simulated network.

Bring Your Windows Laptop No Experience Required

10 Apr 2018 0900-1100 (student session) Registration:

https://utsaresearch.wufoo.com/forms/us-army-research-laboratory-route-hijacking-am/

1330-1530 (non-student session) Registration:

https://utsaresearch.wufoo.com/forms/us-army-research-laboratory-route-hijacking-pm/

COB Annex 1.01.02


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.