the hackerS 27
connection attempts to these devices were being blocked. One of the
Cisco device conguration les was found by Googling, and this con-
guration had some aspects that were the same as other Ciscos—
including the Access Control List that prevented connections to the
device Simple Network Management Protocol (SNMP) (and other
services) other than from some specic source IP address. e next
step was to modify the snmpwalk program (used for querying and
setting conguration of a device over SNMP) to send spoofed source
address packets that instructed strategically chosen routers to send
their congurations to our Trivial File Transfer Protocol server in
our lab in Bangkok. Having compromised routers (full administra-
tive lev