CHAPTER 9

 

Exploiting Cisco Routers

Routers, switches, and other network devices are some of the most critical devices in an infrastructure. All of the mission-critical data flows through these devices, and unfortunately some companies still leave management ports available on the Internet. Whether we encounter these devices on the Internet or inside an organization, understanding some of the basic attacks are critical for the gray hat hacker.

            In this chapter, we cover the following topics:

            •  Attacking community strings and passwords

            •  SNMP and TFTP

            •  Attacking Cisco passwords

            •  Middling traffic with tunnels

            •  Exploits and other attacks

 

Attacking Community Strings ...

Get Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.