Summary

This chapter was a complete guide to learning how to exploit routing protocols and routers. It showed real-world attacking techniques after giving you an insight into the basics and fundamentals of routing protocols. By reading this chapter, you have gained the required knowledge to perform layer 2 and layer 3 attacks and have the right mindset and tools to secure modern company networks. In the next chapter, we will expand our knowledge. Also, you will learn how to secure IoT projects.

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.