BGP Hijacking
Network Design
Before I was able to simulate the attack, I had to design and configure the network topology with configuration files and shell scripts. The rogue AS had to advertise the same prefix as the victim AS in order for the attack to be successful.
Hijacking by Prefix
Once the network topology was in place, I ran a shell script that initiated the steps necessary for the rogue AS to impersonate the victim AS. By advertising the same prefix as the victim and a shorter path length, the rogue AS was able to siphon all of the network traffic destined for the victim AS.
Exploring Vulnerabilities in BGP
In this project I was able to recreate a BGP Hijacking scenario where a rogue Autonomous System impersonates a victim AS in order to hijack its internet traffic.
Linux
Shell Scripts
Network Design
BGP Security
*Due to Georgia Tech class policies, I cannot share code or any other materials that would reveal project solutions.