-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > Every year the con organizers invite different companies to hook up > their own gear to the uplink to capture and analyze data. Was this > related to that, or were the defcon staff unaware that this was > happening? > This was unrelated. Basically a goon and a friend were in the middle of putting together a presentation for NANOG and with the cancellation of one of the MIT Boston Transit presentation, these guys offered to show what they had instead.
The important part of the presentation was that they (neither people nor gear) did not have to be anywhere near Defcon, nor did they have to attack the facilities that house the gear for Defcon, including their bandwidth providers. Basically they ganked some unassigned IPs, and then pushed out routes to the Defcon IP block to go through their ganked IPs. It was a proof of concept that was something impressive to see. Contact me offlist if you are interested in seeing a recording of this (I won't get it for a month or two, so no rush). FYI this years vendor was Airdefense (http://www.airdefense.net). I talked to a couple of their guys. It is worth checking them out. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFIofJnwRXgH3rKGfMRAhmSAJ9//2ECkszu20pxETBk3ogLCKqV7wCffCwu 4mTDg82hnbUsdHqYI6mwrMg= =6dA6 -----END PGP SIGNATURE----- _______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

