Through the Looking-Glass, and What Eve Found There

Through the Looking-Glass, and What Eve Found There

Traditionally, network operators have provided some kind of public read-only access to their current view of the BGP routing table, by the means of a "looking glass”.

In this talk we inspect looking glass instances from a security point of view, showing many shortcomings and flaws which could let a malicious entity take control of critical devices connected to them.

In particular, we will highlight how easy it is for a low-skilled attacker to gain access to core routers within multiple ISP infrastructures.

Presented by