[c-nsp] MPLS penetration testing

Blake Dunlap ikiris at gmail.com
Thu Dec 11 12:40:26 EST 2014


The short version: http://xkcd.com/463/

-Blake

On Thu, Dec 11, 2014 at 1:51 AM, GSW <gordon at gswsystems.com> wrote:
> If you're exposing your control plane to possible attack vectors, you have serious architectural issues...
>
> The reason you don't see many exploit tools is because the control plane isn't generally exposed (and the needed proximity i.e. being able to pass the frame to a port that will accept an mpls packet)
>
> The control isn't even exposed to other providers - NNI is generally the tool of choice there
>
>
>> On 9 Dec 2014, at 11:07 pm, M K <gunner_200 at live.com> wrote:
>>
>> Hi allHave anyone tried tools for MPLS networks penetration testing?
>> Thanks
>> _______________________________________________
>> cisco-nsp mailing list  cisco-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/


More information about the cisco-nsp mailing list