Watch this video on YouTube
How does an attacker use BGP exploits to gather information from target systems?