Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
the hackerS 27
connection attempts to these devices were being blocked. One of the
Cisco device conguration les was found by Googling, and this con-
guration had some aspects that were the same as other Ciscos—
including the Access Control List that prevented connections to the
device Simple Network Management Protocol (SNMP) (and other
services) other than from some specic source IP address. e next
step was to modify the snmpwalk program (used for querying and
setting conguration of a device over SNMP) to send spoofed source
address packets that instructed strategically chosen routers to send
their congurations to our Trivial File Transfer Protocol server in
our lab in Bangkok. Having compromised routers (full administra-
tive lev
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355