Post Exploitation in Software-Defined Networking: A Controller's Perspective
Category: Exploit Research
Summary: Software-Defined Networking (SDN) is an emerging paradigm to support and optimize virtualization communication systems. Numerous research development approaches utilize SDN as a catalyst to enhance network management between computing systems and to identify common network security attacks. A major concern in the use of SDN is the trust that an administrator places on their security appliances. This talk provides a broad scale view of SDN functionality, and discusses the scenario where an SDN controller is compromised from either an insider threat or an external adverse user, and how a threat actor can execute post exploitation techniques to an SDN environment. Additionally, this talk discusses how a compromised SDN controller can manipulate network communication towards end-users thus, leading to potential data loss.
Lastly, this talk describes the varying differences an offensive user may achieve in an SDN environment in comparison to traditional hardware-based networking devices.