Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

Автор: Black Hat

Загружено: 2026-01-06

Просмотров: 1204

Описание:

Gaining initial access to an intranet is one of the most challenging parts of red teaming. If an attack chain is intercepted by an incident response team, the entire operation must be restarted. In this talk, we introduce a technique for gaining initial access to an intranet that does not involve phishing, exploiting public-facing applications, or having a valid account. Instead, we leverage the use of stateless tunnels, such as GRE and VxLAN, which are widely used by companies like Cloudflare and Amazon. This technique affects not only Cloudflare's customers but also other companies.

Additionally, we will share evasion techniques that take advantage of company intranets that do not implement source IP filtering, preventing IR teams from intercepting the full attack chain. Red teamers could confidently perform password spraying within an internal network without worrying about losing a compromised foothold.

Also, we will reveal a nightmare of VxLAN in Linux Kernel and RouterOS. This affects many companies, including ISPs. This feature is enabled by default and allows anyone to hijack the entire tunnel, granting intranet access, even if the VxLAN is configured on a private IP interface through an encrypted tunnel. What's worse, RouterOS users cannot disable this feature. This problem can be triggered simply by following the basic VxLAN official tutorial. Furthermore, if the tunnel runs routing protocols like BGP or OSPF, it can lead to the hijacking of internal IPs, which could result in domain compromises. We will demonstrate the attack vectors that red teamers can exploit after hijacking a tunnel or compromising a router by manipulating the routing protocols.

Lastly, we will conclude the presentation by showing how companies can mitigate these vulnerabilities. Red teamers can use these techniques and tools to scan targets and access company intranets. This approach opens new avenues for further research.

By:
Shu-Hao Tung | Threat Researcher, Trend Micro

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/...

From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

OSINT для начинающих: узнайте всё о ком угодно!

OSINT для начинающих: узнайте всё о ком угодно!

Lost in Translation: Exploiting Unicode Normalization

Lost in Translation: Exploiting Unicode Normalization

NixOS Explained in Detail | The Most Powerful Declarative Linux Operating System

NixOS Explained in Detail | The Most Powerful Declarative Linux Operating System

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin  Yu

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu

Я в опасности

Я в опасности

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

DEF CON 33 — Истории от разработчика Tor — Роджера «arma» Динглдина

The World's Most Important Machine

The World's Most Important Machine

Building the PERFECT Linux PC with Linus Torvalds

Building the PERFECT Linux PC with Linus Torvalds

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew  Brandt

DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt

The Strange Math That Predicts (Almost) Anything

The Strange Math That Predicts (Almost) Anything

The 11th Annual Black Hat USA Network Operations Center (NOC) Report

The 11th Annual Black Hat USA Network Operations Center (NOC) Report

Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services

Diving into Windows HTTP: Unveiling Hidden Preauth Vulnerabilities in Windows HTTP Services

Why Light Speed Is The LIMIT? What Feynman Uncovered Will COLLAPSE Your Mind

Why Light Speed Is The LIMIT? What Feynman Uncovered Will COLLAPSE Your Mind

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Clustered Points of Failure - Attacking Windows Server Failover Clusters

Clustered Points of Failure - Attacking Windows Server Failover Clusters

Libraries That Quietly Revolutionized C

Libraries That Quietly Revolutionized C

15 незаконных хакерских устройств, которыми вы можете владеть на законных основаниях

15 незаконных хакерских устройств, которыми вы можете владеть на законных основаниях

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com