[c-nsp] MPLS penetration testing

GSW gordon at gswsystems.com
Thu Dec 11 04:51:43 EST 2014


If you're exposing your control plane to possible attack vectors, you have serious architectural issues...

The reason you don't see many exploit tools is because the control plane isn't generally exposed (and the needed proximity i.e. being able to pass the frame to a port that will accept an mpls packet)

The control isn't even exposed to other providers - NNI is generally the tool of choice there


> On 9 Dec 2014, at 11:07 pm, M K <gunner_200 at live.com> wrote:
> 
> Hi allHave anyone tried tools for MPLS networks penetration testing?
> Thanks                         
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/



More information about the cisco-nsp mailing list