February 2018
Intermediate to advanced
396 pages
9h 38m
English
During a remote false adjacency attack, the attacker plays the role of a router and exploits the fact that routers can successfully complete the adjacency setup. This attack can be avoided by enabling TTL security:

Read now
Unlock full access