This course aims to teach learners about the architecture, operation, deployment, and management of load balancers, focusing on their vulnerabilities and exploitation post-breach. The course covers how to avoid common mistakes, understand the design concepts applicable across various platforms, and leverage vendor documentation for post-exploitation activities. The primary audience for this course includes individuals interested in offensive operations, but defenders can also benefit from the information to secure their environments and conduct DFIR operations post-breach.
Overview
Syllabus
03 - BruCON 0x0E - I am become loadbalancer, owner of your network - Nate Warfield
Taught by
BruCON Security Conference