Infrastructure Hacking: BGP Protocol II
BGP Hijacking This article is a continuation of the last post on the BGP protocol. If you haven’t read it yet, do so before you start. Let’s remember where we left off in the previous post. What we think is happening is that a user who will be on AS-200 is connecting to FTP, and we … Read more