Speaker
Description
In security, a blackhole is a place in the infrastructure where incoming traffic is silently discarded without informing the source, therefore the traffic does not reach its destination. The blackhole traffic, or otherwise called unwanted traffic, can be considered as worthless traffic - trash. However, this is far from being the case. That traffic may include interesting attack indicators or even information about incorrect technical configurations that may be used for reconnaissance, so finding attack vectors on a new victim.
The takeaway of this presentation is to raise awareness about the importance of careful configurations of devices by showing practical examples and to show some mitigation techniques to properly configure devices such that your config does not talk trash!