-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> 
> Every year the con organizers invite different companies to hook up
> their own gear to the uplink to capture and analyze data.  Was this
> related to that, or were the defcon staff unaware that this was
> happening?
> 
This was unrelated.  Basically a goon and a friend were in the middle of
putting together a presentation for NANOG and with the cancellation of
one of the MIT Boston Transit presentation, these guys offered to show
what they had instead.

The important part of the presentation was that they (neither people nor
gear) did not have to be anywhere near Defcon, nor did they have to
attack the facilities that house the gear for Defcon, including their
bandwidth providers.  Basically they ganked some unassigned IPs, and
then pushed out routes to the Defcon IP block to go through their ganked
IPs.  It was a proof of concept that was something impressive to see.
Contact me offlist if you are interested in seeing a recording of this
(I won't get it for a month or two, so no rush).

FYI this years vendor was Airdefense (http://www.airdefense.net).  I
talked to a couple of their guys.  It is worth checking them out.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIofJnwRXgH3rKGfMRAhmSAJ9//2ECkszu20pxETBk3ogLCKqV7wCffCwu
4mTDg82hnbUsdHqYI6mwrMg=
=6dA6
-----END PGP SIGNATURE-----

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to