1 00:00:06,826 --> 00:00:10,373 - Welcome to Lesson 8: Hacking Networking Devices. 2 00:00:10,373 --> 00:00:12,658 In this lesson we'll start with looking at why 3 00:00:12,658 --> 00:00:15,544 network devices are a target for hackers, followed by 4 00:00:15,544 --> 00:00:19,035 reviewing the fundamentals of networking technology. 5 00:00:19,035 --> 00:00:23,161 This includes the OSI and DoD Internet Reference Models, 6 00:00:23,161 --> 00:00:27,423 ethernet, routers, switches, firewalls and 7 00:00:27,423 --> 00:00:29,856 networking security products. 8 00:00:29,856 --> 00:00:31,726 We'll review the different planes of network 9 00:00:31,726 --> 00:00:34,022 devices, such as the data plane, control 10 00:00:34,022 --> 00:00:36,568 plane, and management plane. 11 00:00:36,568 --> 00:00:38,565 You'll learn about local attacks against 12 00:00:38,565 --> 00:00:40,995 switches and broadcast domains, or virtual 13 00:00:40,995 --> 00:00:44,009 LANs, including attacks against VLAN 14 00:00:44,009 --> 00:00:48,406 Trunking Protocol, or VTP, and ARP cache poisoning. 15 00:00:48,406 --> 00:00:51,216 Then we'll extend our attacks into routers, 16 00:00:51,216 --> 00:00:54,149 first-hop redundancy protocols and interior gateway 17 00:00:54,149 --> 00:00:58,495 protocols, such as OSPF or open shortest path first, 18 00:00:58,495 --> 00:01:00,610 including how to use these tools to pull off 19 00:01:00,610 --> 00:01:02,392 man-in-the-middle attacks. 20 00:01:02,392 --> 00:01:05,801 We have a lot to cover, so let's get started.